lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Fri, 23 Oct 2009 10:31:14 -0700
From:	Jeremy Fitzhardinge <jeremy@...p.org>
To:	Ingo Molnar <mingo@...e.hu>
CC:	Daniel Walker <dwalker@...o99.com>,
	Erwan Velu <erwanaliasr1@...il.com>,
	linux-kernel@...r.kernel.org, x86@...nel.org
Subject: Re: [PATCH] dmi_check_system can generate Warnings when no DMI	table
 is present

On 10/23/09 10:04, Ingo Molnar wrote:
>> Yes.  There's nothing preventing the DMI subsystem from being 
>> initialized under Xen; in fact we rely on it in a dom0 kernel (which 
>> does have access to the DMI tables).  I don't know what the underlying 
>> bug in the original report is, but there's more to it than failing to 
>> init DMI.
>>     
> yeah. It's probably some init ordering problem - some version of Xen 
> calling into the DMI code too early. It probably doesnt even matter in 
> practice as we rarely rely on DMI details in Xen guests, right?
>   

The backtraces in the original report showed that the messages were
coming from DMI calls in the PCI init path or i8042_init.  PCI shouldn't
be being called early, and i8042_init is just a normal module_init.

DomU has no DMI (we just put all zeros into the ISA window to catch any
probes), and nothing Xen-specific has any DMI dependencies.  So there
should be no cause to make any premature dmi calls.

It looks like setup_arch() is being missed, but its hard to see how we'd
get very far in that case...

Also, the referenced reports are for distro kernels which may not
contain mainline Xen in the first place (Novell have their own massive
Xen patch stack they dump onto the kernels before shipping, so Xen bug
reports against SuSE kernels don't have any relevance to mainline).  I'd
like to see a boot log of a mainline kernel showing the problem.

    J
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ