lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 22 May 2007 14:23:05 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	jfannin@...il.com (Joseph Fannin)
Cc:	linux-kernel@...r.kernel.org, zohar@...ibm.com, kjhall@...ibm.com
Subject: Re: 2.6.22-rc1-mm1: evm BUG when reading sysfs file

On Tue, 22 May 2007 03:25:48 -0400
jfannin@...il.com (Joseph Fannin) wrote:

> On Tue, May 15, 2007 at 08:19:14PM -0700, Andrew Morton wrote:
> >
> > ftp://ftp.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.22-rc1/2.6.22-rc1-mm1/
> 
> I've been getting this since 2.6.21-rc7-mm1:
> 
> [    2.379310] BUG: unable to handle kernel paging request at virtual address 4400d340
> [    2.379491]  printing eip:
> [    2.379573] c021c978
> [    2.379656] *pdpt = 000000000353c001
> [    2.379739] *pde = 0000000000000000
> [    2.379824] Oops: 0000 [#1]
> [    2.379906] PREEMPT SMP
> [    2.380059] Modules linked in: thermal processor dm_mod
> [    2.380288] CPU:    0
> [    2.380289] EIP:    0060:[<c021c978>]    Not tainted VLI
> [    2.380291] EFLAGS: 00010297   (2.6.22-rc1-mm1 #2)
> [    2.380547] EIP is at vsnprintf+0x448/0x5d0
> [    2.380633] eax: 4400d340   ebx: c348f034   ecx: 4400d340   edx: fffffffe
> [    2.380721] esi: c03e0100   edi: 4400d340   ebp: c357ecc0   esp: c357ec68
> [    2.380810] ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
> [    2.380898] Process udevtrigger (pid: 686, ti=c357e000 task=c1876df0 task.ti=c357e000)
> [    2.380987] Stack: c348f014 00000fec c03e1c60 c03e3cec c357eccc c0499b88 c357ece0 c0282513
> [    2.381428]        c348f014 00000fec 3cb70fcb c348f034 ffffffff 00000000 ffffffff ffffffff
> [    2.381867]        ffffffff fffffffe c03e017c c357ed18 00000034 c0494a20 c357ece0 c021cb9f
> [    2.382305] Call Trace:
> [    2.382470]  [<c021cb9f>] sprintf+0x1f/0x30
> [    2.382594]  [<c02815ed>] show_uevent+0xed/0x130
> [    2.382720]  [<c0281163>] dev_attr_show+0x23/0x30
> [    2.382843]  [<c01dc077>] sysfs_read_file+0x97/0x140
> [    2.382968]  [<c019502f>] vfs_read+0xaf/0x180
> [    2.383096]  [<c0198c3a>] kernel_read+0x3a/0x50
> [    2.383221]  [<c01f126c>] evm_calc_hash+0x11c/0x240
> [    2.383347]  [<c01efd39>] evm_file_free+0xb9/0x330
> [    2.383470]  [<c0195a3a>] __fput+0xba/0x180
> [    2.383593]  [<c0195c32>] fput+0x22/0x40
> [    2.383715]  [<c0192e07>] filp_close+0x47/0x70
> [    2.383839]  [<c0194109>] sys_close+0x69/0xc0
> [    2.383965]  [<c01043c8>] syscall_call+0x7/0xb
> [    2.384092]  [<b7ebd0a7>] 0xb7ebd0a7
> [    2.384212]  =======================
> [    2.384295] INFO: lockdep is turned off.
> [    2.384379] Code: 21 fd ff ff c6 03 25 e9 19 fd ff ff 8d 4f 04 b8
> 3b a2 3d c0 8b 55 e4 89 4d 08 8b 3f 81 ff ff 0f 00 00 0f 46 f8 89 f9
> 89 c8 eb 06 <80> 38 00 74 07 40 4a 83 fa ff 75 f4 29 c8 89 c6 8b 45 e0
> f6 45
> [    2.386787] EIP: [<c021c978>] vsnprintf+0x448/0x5d0 SS:ESP 0068:c357ec68
> 
>     This comes a bit after IMA bails out successfully, if that's relevant:
> 
> [    1.708761] ima (ima_init): No TPM chip found(rc = -19), activating
> TPM-bypass!

OK, thanks.  Does the crash go away if you disable IMA, SLIM, etc in .config?

I think I'll drop all those patches, actually - they don't seem to be going
anywhere.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists