Dave found kdump kernel with kaslr enabled will reset to bios immediately if physical randomization failed to find a new position for kernel. But kernel with 'nokaslr' option works in this case.
The reason is kaslr will install a new page table for ident mapping, while it missed to consider building ident mapping for original area of kernel if kaslr failed on physical randomization. This only happens in kexec/kdump kernel. Since ident mapping has been built for kexec/kdump in 1st kernel for the whole memory by calling init_pgtable(). Here if physical randomizaiton failed, it won't build ident mapping for the original area of kernel but change to new page table '_pgtable'. Then kernel will reset to bios immediately caused by no ident mapping. While normal kernel won't be impacted because it comes here via startup_32() and cr3 will be _pgtable already. In startup_32() ident mapping is built for 0~4G area. In kaslr We just append to the existing area instead of entirely overwriting it for on-demand ident mapping building. So ident mapping for the original area of kernel is still there. So for fixing it, We just switch to the new ident mapping page table when physical kaslr succeeds. Otherwise we keep the old page table unchanged just like nokaslr does. Signed-off-by: Baoquan He <b...@redhat.com> Signed-off-by: Dave Young <dyo...@redhat.com> Acked-by: Kees Cook <keesc...@chromium.org> Cc: "H. Peter Anvin" <h...@zytor.com> Cc: Thomas Gleixner <t...@linutronix.de> Cc: Ingo Molnar <mi...@redhat.com> Cc: x...@kernel.org Cc: Kees Cook <keesc...@chromium.org> Cc: Yinghai Lu <ying...@kernel.org> Cc: Borislav Petkov <b...@suse.de> Cc: Dave Jiang <dave.ji...@intel.com> Cc: Thomas Garnier <thgar...@google.com> --- v1->v2: No code change, just improve patch log to make it clearer. arch/x86/boot/compressed/kaslr.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/arch/x86/boot/compressed/kaslr.c b/arch/x86/boot/compressed/kaslr.c index e5eb0c3..7a8b443 100644 --- a/arch/x86/boot/compressed/kaslr.c +++ b/arch/x86/boot/compressed/kaslr.c @@ -650,10 +650,16 @@ void choose_random_location(unsigned long input, add_identity_map(random_addr, output_size); *output = random_addr; } + + /* + * This actually loads the identity pagetable on x86_64. + * And this should only be done only if a new position + * is found. Otherwise we should keep the old page table + * to make it be like nokaslr case. + */ + finalize_identity_maps(); } - /* This actually loads the identity pagetable on x86_64. */ - finalize_identity_maps(); /* Pick random virtual address starting from LOAD_PHYSICAL_ADDR. */ if (IS_ENABLED(CONFIG_X86_64)) -- 2.5.5