Bug 132997
Summary: | Signed module causes unaligned kernel access | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 4 | Reporter: | H.J. Lu <hongjiu.lu> | ||||
Component: | kernel | Assignee: | David Howells <dhowells> | ||||
Status: | CLOSED WORKSFORME | QA Contact: | Brian Brock <bbrock> | ||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | 4.0 | CC: | jbaron, jturner, wtogami | ||||
Target Milestone: | --- | Keywords: | Reopened | ||||
Target Release: | --- | ||||||
Hardware: | ia64 | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2007-02-08 17:00:13 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Attachments: |
|
Description
H.J. Lu
2004-09-20 19:21:51 UTC
kernel unaligned accesses are legal and usually not a problem I'll neuter the warning 2.6.8-1.603 still reports: kernel unaligned access to 0xa0000002002d805e, ip=0xa0000001002112e0 kernel unaligned access to 0xa0000002002d806e, ip=0xa0000001002112e0 kernel unaligned access to 0xa0000002002d807e, ip=0xa0000001002112e0 kernel unaligned access to 0xa0000002002d808e, ip=0xa0000001002112e0 2.6.9-1.648_EL has the same problem: kernel unaligned access to 0xa00000020039805f, ip=0xa000000100215c80 kernel unaligned access to 0xa00000020039806f, ip=0xa000000100215c80 kernel unaligned access to 0xa00000020039807f, ip=0xa000000100215c80 kernel unaligned access to 0xa00000020039808f, ip=0xa000000100215c80 I have a patch for this. The problem is that the SHA1 crypto code is given a u8* to the buffer it is to digest, but then reads from it as u32* under certain circumstances. Situations can be contrived in which the u32* will be misaligned, either by preloading the digest with an odd number of bytes or by passing it a pointer that's not aligned on a 32-bit boundary. For most archs, this shouldn't be a problem as fixing up is possible, if not trivial; but for some archs fixing up isn't possible. So I've made the patch fix SHA1 rather than removing the warning from IA64. Created attachment 106966 [details]
Patch to fix SHA1's potential misaligned accesses
This patch works for me. Fix confirmed with latest code. Closing out. REOPENED status has been deprecated. ASSIGNED with keyword of Reopened is preferred. closed per comment #17. If anyone would like to revisit this issue, please reopen if need to. |