lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <OF221AC3A7.91DF97D1-ON852572E6.007E756B-852572E7.000D90F8@us.ibm.com>
Date:	Fri, 25 May 2007 22:28:22 -0400
From:	Reiner Sailer <sailer@...ibm.com>
To:	jfannin@...il.com
Cc:	Andrew Morton <akpm@...ux-foundation.org>,
	linux-kernel@...r.kernel.org, safford@...ibm.com, zohar@...ibm.com,
	serue@...ibm.com
Subject: Re: 2.6.22-rc1-mm1: evm BUG when reading sysfs file

On Tue, 22 May 2007 03:25:48 -0400
jfannin@...il.com (Joseph Fannin) wrote:

> 
> I've been getting this since 2.6.21-rc7-mm1:
> 
> [    2.379310] BUG: unable to handle kernel paging request at virtual 
address 4400d340
> [    2.379491]  printing eip:
> [    2.379573] c021c978
> [    2.379656] *pdpt = 000000000353c001
> [    2.379739] *pde = 0000000000000000
> [    2.379824] Oops: 0000 [#1]
> [    2.379906] PREEMPT SMP
> [    2.380059] Modules linked in: thermal processor dm_mod
> [    2.380288] CPU:    0
> [    2.380289] EIP:    0060:[<c021c978>]    Not tainted VLI
> [    2.380291] EFLAGS: 00010297   (2.6.22-rc1-mm1 #2)
> [    2.380547] EIP is at vsnprintf+0x448/0x5d0
> [    2.380633] eax: 4400d340   ebx: c348f034   ecx: 4400d340   edx: 
fffffffe
> [    2.380721] esi: c03e0100   edi: 4400d340   ebp: c357ecc0   esp: 
c357ec68
> [    2.380810] ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
> [    2.380898] Process udevtrigger (pid: 686, ti=c357e000 task=c1876df0 
task.ti=c357e000)
> [    2.380987] Stack: c348f014 00000fec c03e1c60 c03e3cec c357eccc 
c0499b88 c357ece0 c0282513
> [    2.381428]        c348f014 00000fec 3cb70fcb c348f034 ffffffff 
00000000 ffffffff ffffffff
> [    2.381867]        ffffffff fffffffe c03e017c c357ed18 00000034 
c0494a20 c357ece0 c021cb9f
> [    2.382305] Call Trace:
> [    2.382470]  [<c021cb9f>] sprintf+0x1f/0x30
> [    2.382594]  [<c02815ed>] show_uevent+0xed/0x130
> [    2.382720]  [<c0281163>] dev_attr_show+0x23/0x30
> [    2.382843]  [<c01dc077>] sysfs_read_file+0x97/0x140
> [    2.382968]  [<c019502f>] vfs_read+0xaf/0x180
> [    2.383096]  [<c0198c3a>] kernel_read+0x3a/0x50
> [    2.383221]  [<c01f126c>] evm_calc_hash+0x11c/0x240
> [    2.383347]  [<c01efd39>] evm_file_free+0xb9/0x330
> [    2.383470]  [<c0195a3a>] __fput+0xba/0x180
> [    2.383593]  [<c0195c32>] fput+0x22/0x40
> [    2.383715]  [<c0192e07>] filp_close+0x47/0x70
> [    2.383839]  [<c0194109>] sys_close+0x69/0xc0
> [    2.383965]  [<c01043c8>] syscall_call+0x7/0xb
> [    2.384092]  [<b7ebd0a7>] 0xb7ebd0a7
> [    2.384212]  =======================
> [    2.384295] INFO: lockdep is turned off.
> [    2.384379] Code: 21 fd ff ff c6 03 25 e9 19 fd ff ff 8d 4f 04 b8
> 3b a2 3d c0 8b 55 e4 89 4d 08 8b 3f 81 ff ff 0f 00 00 0f 46 f8 89 f9
> 89 c8 eb 06 <80> 38 00 74 07 40 4a 83 fa ff 75 f4 29 c8 89 c6 8b 45 e0
> f6 45
> [    2.386787] EIP: [<c021c978>] vsnprintf+0x448/0x5d0 SS:ESP 
0068:c357ec68
> 
>     This comes a bit after IMA bails out successfully, if that's 
relevant:
> 
> [    1.708761] ima (ima_init): No TPM chip found(rc = -19), activating
> TPM-bypass!

Joseph,

thank you for posting this problem. I cannot reconstruct it on my machine.

Could you tell us which kernel configuration you used (drivers/char/tpm 
and security settings) ?
Does it disappear when IMA is disabled in the kernel config?

Reiner
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ