PaX Team wrote:yes, please, i was going to do it myself soon now that i got all the free time i need .
Ok, it's done. I'm pre-building the source tree right now so (hopefully) not too many objects will need to be rebuilt as you make changes.
PaX Team wrote:yes, please, i was going to do it myself soon now that i got all the free time i need .
PaX Team wrote:yes, please, i was going to do it myself soon now that i got all the free time i need .john_anderson_ii wrote:Do you want me to put the 2.6.31.5 sources, build, etc on that rPath-Xen test box we setup for you to debug this?
0xffffffff81814aff in xen_start_kernel () at arch/x86/xen/enlighten.c:1133
1133 per_cpu(xen_vcpu, 0) = &HYPERVISOR_shared_info->vcpu_info[0];
(XEN) d16:v0: unhandled page fault (ec=0002)
(XEN) Pagetable walk from 0000000000004018:
(XEN) L4[0x000] = 0000000000000000 ffffffffffffffff
(XEN) domain_crash_sync called from entry.S
(XEN) Domain 16 (vcpu#0) crashed on cpu#1:
(XEN) ----[ Xen-3.3.1 x86_64 debug=n Not tainted ]----
(XEN) CPU: 1
(XEN) RIP: e033:[<ffffffff81814aff>]
(XEN) RFLAGS: 0000000000000246 EM: 1 CONTEXT: pv guest
(XEN) rax: 0000000000004018 rbx: ffffffff82284000 rcx: ffffffff8189e410
(XEN) rdx: 0000000000000000 rsi: 0000000000000007 rdi: 0000000000000003
(XEN) rbp: ffffffff81601ff8 rsp: ffffffff81601fa0 r8: 0000000000000000
(XEN) r9: 0000000000000000 r10: 0000000000000000 r11: 0000000000000000
(XEN) r12: 0000000000000000 r13: 0000000000000000 r14: 0000000000000000
(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000026b0
(XEN) cr3: 000000016dd7b000 cr2: 0000000000004018
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033
(XEN) Guest stack trace from rsp=ffffffff81601fa0:
(XEN) ffffffff8189e410 0000000000000000 0000000000000002 ffffffff81814aff
(XEN) 000000010000e030 0000000000010046 ffffffff81601fe8 000000000000e02b
(XEN) ffffffff81814adf 0000000000000000 0000000000000000 0000000000000000
(XEN) ffffffff82201000 ffffffff82202000 ffffffff82203000 ffffffff82204000
(XEN) ffffffff82205000 ffffffff82206000 ffffffff82207000 ffffffff82208000
(XEN) ffffffff82209000 ffffffff8220a000 ffffffff8220b000 ffffffff8220c000
(XEN) ffffffff8220d000 ffffffff8220e000 ffffffff8220f000 ffffffff82210000
(XEN) ffffffff82211000 ffffffff82212000 ffffffff82213000 ffffffff82214000
(XEN) ffffffff82215000 ffffffff82216000 ffffffff82217000 ffffffff82218000
(XEN) ffffffff82219000 ffffffff8221a000 ffffffff8221b000 ffffffff8221c000
(XEN) ffffffff8221d000 ffffffff8221e000 ffffffff8221f000 ffffffff82220000
(XEN) ffffffff82221000 ffffffff82222000 ffffffff82223000 ffffffff82224000
(XEN) ffffffff82225000 ffffffff82226000 ffffffff82227000 ffffffff82228000
(XEN) ffffffff82229000 ffffffff8222a000 ffffffff8222b000 ffffffff8222c000
(XEN) ffffffff8222d000 ffffffff8222e000 ffffffff8222f000 ffffffff82230000
(XEN) ffffffff82231000 ffffffff82232000 ffffffff82233000 ffffffff82234000
(XEN) ffffffff82235000 ffffffff82236000 ffffffff82237000 ffffffff82238000
(XEN) ffffffff82239000 ffffffff8223a000 ffffffff8223b000 ffffffff8223c000
(XEN) ffffffff8223d000 ffffffff8223e000 ffffffff8223f000 ffffffff82240000
(XEN) ffffffff82241000 ffffffff82242000 ffffffff82243000 ffffffff82244000
no, i moved to .32 and am still working on it.bplant wrote:Was 2.6.31.* ever made to work?
hmm, that's not where it dies for me, can you send me your vmlinux (not bzImage) please that corresponds to this report?I've just tried 2.6.32.6 since it's going to be supported long term, but it crashes straight away.
I have emailed it to you.PaX Team wrote:hmm, that's not where it dies for me, can you send me your vmlinux (not bzImage) please that corresponds to this report?I've just tried 2.6.32.6 since it's going to be supported long term, but it crashes straight away.
can you post any logs you get please? i have yet to figure out how to test 32 bit domU, so you'll have to help me out here .cormander wrote:I am, however, not able to boot the 32bit version of the kernel. Here is the workspace of the said kernel:
# xm create -c grsec32.cormander.com
Using config file "/etc/xen/grsec32.cormander.com".
Started domain grsec32.cormander.com
#
(XEN) traps.c:405:d72 Unhandled general protection fault fault/trap [#13] in domain 72 on VCPU 0 [ec=0000]
(XEN) domain_crash_sync called from entry.S
(XEN) Domain 72 (vcpu#0) crashed on cpu#0:
(XEN) ----[ Xen-3.1.2-128.1.6.el5 x86_64 debug=n Not tainted ]----
(XEN) CPU: 0
(XEN) RIP: e019:[<00000000c1005913>]
(XEN) RFLAGS: 0000000000000246 CONTEXT: guest
(XEN) rax: 000000000000000c rbx: 00000000c1a43000 rcx: 00000000c17fd008
(XEN) rdx: 00000000c1783000 rsi: 00000000c17c2610 rdi: 00000000c170cae8
(XEN) rbp: 00000000c16f1fd0 rsp: 00000000c16f1fc0 r8: 0000000000000000
(XEN) r9: 0000000000000000 r10: 0000000000000000 r11: 0000000000000000
(XEN) r12: 0000000000000000 r13: 0000000000000000 r14: 0000000000000000
(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0
(XEN) cr3: 000000008f812000 cr2: 0000000000000000
(XEN) ds: e021 es: e021 fs: 00d8 gs: 0000 ss: e021 cs: e019
(XEN) Guest stack trace from esp=c16f1fc0:
(XEN) 00000000 c1005913 0001e019 00010046 c16f1ffc c10058a6 c17fd008 c178d1fb
(XEN) 00000000 00000000 00000000 00000000 00000000 c1a40000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
thanks, it seems that the per-cpu segment register is incorrectly set up, i'll take a look.cormander wrote:Output simply ends when it should show booting. This produces in the following in "xm dmesg":
that should work too, i tested with all PaX features enabled (for MPROTECT to work you have to clean your system of GNU_STACK breakage though). this crash looks like some NULL function ptr dereference in the guest, not sure why it was handled by the hypervisor though. could you send me the vmlinux that corresponds to this log? or compile one again, crash it and send them both my way?gaima wrote:This didn't work so well at first though, with the "xm dmesg" included below. After 21 attempts I've isolated the CONFIG directive that causes it to crash. CONFIG_PAX_MPROTECT, on it crashes, off it doesn't.
that's weird because your crash log above was from a kernel without KERNEXEC (check the .config).cormander wrote:For what it's worth, CONFIG_GRKERNSEC_HIGH set CONFIG_PAX_KERNEXEC, which causes the xen domU to not even boot.
PaX Team wrote:that's weird because your crash log above was from a kernel without KERNEXEC (check the .config).cormander wrote:For what it's worth, CONFIG_GRKERNSEC_HIGH set CONFIG_PAX_KERNEXEC, which causes the xen domU to not even boot.