Bug#336220: xdm: bogus /dev/mem access lead to trouble on arm platforms

2007-09-17 Thread Brice Goglin
On Sun, Aug 19, 2007 at 02:31:49PM +0200, Brice Goglin wrote:
 On Fri, Oct 28, 2005 at 07:47:14PM +0200, Lennert Buytenhek wrote:
  On arm platforms where physical RAM doesn't start at physical address
  zero, opening /dev/mem and reading from it causes a kernel oops.  This
  is arguably a kernel bug, but it's still not a very good idea to just
  start randomly poking around in /dev/mem in search of entropy, which is
  what xdm does if it can't get entropy elsewhere.
  
  (When the kernel is fixed, blindly reading from /dev/mem will simply
  just fail with EFAULT instead of oopsing.  If that will cause xdm to
  fail, it should really just fail right away if /dev/random doesn't work.)
 
 xdm seems to try /dev/urandom first nowadays (before /dev/random and then
 /dev/mem). I don't whether arm systems have a /dev/urandom, but it seems
 more likely than having a /dev/random.
 
 I don't know which version of xdm you were running when you reported this
 problem (Xorg 6.8.2 was the latest release on 2005/10/28). But it was at
 the same time that the urandom support has been added upstream (in Xorg
 6.9.99.902 on 2005/10/29).
 
 So please test with a more recent xdm and report back whether it helps.

Ping?



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#336220: xdm: bogus /dev/mem access lead to trouble on arm platforms

2007-09-17 Thread Lennert Buytenhek
On Mon, Sep 17, 2007 at 08:55:49AM +0200, Brice Goglin wrote:

   On arm platforms where physical RAM doesn't start at physical address
   zero, opening /dev/mem and reading from it causes a kernel oops.  This
   is arguably a kernel bug, but it's still not a very good idea to just
   start randomly poking around in /dev/mem in search of entropy, which is
   what xdm does if it can't get entropy elsewhere.
   
   (When the kernel is fixed, blindly reading from /dev/mem will simply
   just fail with EFAULT instead of oopsing.  If that will cause xdm to
   fail, it should really just fail right away if /dev/random doesn't work.)
  
  xdm seems to try /dev/urandom first nowadays (before /dev/random and then
  /dev/mem). I don't whether arm systems have a /dev/urandom, but it seems
  more likely than having a /dev/random.
  
  I don't know which version of xdm you were running when you reported this
  problem (Xorg 6.8.2 was the latest release on 2005/10/28). But it was at
  the same time that the urandom support has been added upstream (in Xorg
  6.9.99.902 on 2005/10/29).
  
  So please test with a more recent xdm and report back whether it helps.
 
 Ping?

I'm not sure what to reply to this.

The problem is not that xdm doesn't check /dev/urandom first, the
problem is that it reads from /dev/mem _at all_.

It is possible that checking /dev/urandom first masks the problem
in most configurations, but it doesn't solve it (if you don't have
/dev/random and /dev/urandom in your filesystem for whatever reason,
you still oops.)



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#336220: xdm: bogus /dev/mem access lead to trouble on arm platforms

2007-09-17 Thread Brice Goglin
Lennert Buytenhek wrote:
 The problem is not that xdm doesn't check /dev/urandom first, the
 problem is that it reads from /dev/mem _at all_.

 It is possible that checking /dev/urandom first masks the problem
 in most configurations, but it doesn't solve it (if you don't have
 /dev/random and /dev/urandom in your filesystem for whatever reason,
 you still oops.)
   


Right, but still, having a workaround when /dev/urandom exists is much
better than having xdm broken on all arm. So, do you know if
/dev/urandom is more often (always?) available on arm than /dev/random?
What about the machine where you had the original bug?

Brice




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#336220: xdm: bogus /dev/mem access lead to trouble on arm platforms

2007-08-19 Thread Brice Goglin
On Fri, Oct 28, 2005 at 07:47:14PM +0200, Lennert Buytenhek wrote:
 On arm platforms where physical RAM doesn't start at physical address
 zero, opening /dev/mem and reading from it causes a kernel oops.  This
 is arguably a kernel bug, but it's still not a very good idea to just
 start randomly poking around in /dev/mem in search of entropy, which is
 what xdm does if it can't get entropy elsewhere.
 
 (When the kernel is fixed, blindly reading from /dev/mem will simply
 just fail with EFAULT instead of oopsing.  If that will cause xdm to
 fail, it should really just fail right away if /dev/random doesn't work.)

xdm seems to try /dev/urandom first nowadays (before /dev/random and then
/dev/mem). I don't whether arm systems have a /dev/urandom, but it seems
more likely than having a /dev/random.

I don't know which version of xdm you were running when you reported this
problem (Xorg 6.8.2 was the latest release on 2005/10/28). But it was at
the same time that the urandom support has been added upstream (in Xorg
6.9.99.902 on 2005/10/29).

So please test with a more recent xdm and report back whether it helps.

Thanks
Brice


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#336220: xdm: bogus /dev/mem access lead to trouble on arm platforms

2005-10-28 Thread Lennert Buytenhek
Package: xdm
Severity: important

On arm platforms where physical RAM doesn't start at physical address
zero, opening /dev/mem and reading from it causes a kernel oops.  This
is arguably a kernel bug, but it's still not a very good idea to just
start randomly poking around in /dev/mem in search of entropy, which is
what xdm does if it can't get entropy elsewhere.

(When the kernel is fixed, blindly reading from /dev/mem will simply
just fail with EFAULT instead of oopsing.  If that will cause xdm to
fail, it should really just fail right away if /dev/random doesn't work.)


-- System Information:
Debian Release: testing/unstable
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: armeb (armv4b)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]