From: Mimi Zohar <zohar@linux.vnet.ibm.com>
To: Matthias Gerstner <mgerstner@suse.de>
Cc: linux-integrity@vger.kernel.org,
Mikhail Kurinnoi <viewizard@viewizard.com>
Subject: Re: IMA: Deadlock in ima_appraise_measurement when /bin/kmod carries a digsig in security.evm
Date: Sun, 24 Jun 2018 18:31:30 -0400 [thread overview]
Message-ID: <1529879490.3343.4.camel@linux.vnet.ibm.com> (raw)
In-Reply-To: <1529696928.3418.16.camel@linux.vnet.ibm.com>
On Fri, 2018-06-22 at 15:48 -0400, Mimi Zohar wrote:
> On Wed, 2018-06-20 at 12:53 +0200, Matthias Gerstner wrote:
> > Hello Mimi,
> >
> > > Somehow I missed it. A more generic patch is currently queued, which
> > > should resolve this problem as well. Please try commit fdc33c29b022
> > > ("evm: Don't deadlock if a crypto algorithm is unavailable") in the
> > > next-integrity-queued branch.
> >
> > thank you for helping me out. I tried that patch but it does no fix the
> > issue completely. It still ends up in a deadlock. As you can see from
> > the backtrace attached below the call to public_key_verify_signature()
> > still causes a deadlock, since there is the following call in it:
> >
> > tfm = crypto_alloc_akcipher(alg_name, 0, 0);
> >
> > Passing CRYPTO_NOLOAD here does fix the deadlock for me, but I fear that
> > won't be an option and the interface needs to be extended to pass flags?
>
> I'm having a hard time reproducing this bug. Too many different
> permutations of EVM/IMA keys, signatures, and kernel modules. Is the
> problem loading the crypto algorithm, itself, built as a kernel module
> (eg. insmod/modprobe - If so, which syscall is being used?) Or is the
> problem accessing a file signed by an algorithm built as a kernel
> module.
I'm now able to reproduce the bug.
> Mikhail, I'm really sorry for not seeing the patch. I must have been
> dropped from the sf mailing list and didn't notice. I was only seeing
> posts when Cc'ed on them.
>
> Matthias, does Mikhail's patch fix this problem?
Mikhail's patch does resolve it.
Mimi
prev parent reply other threads:[~2018-06-24 22:31 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-06-18 14:56 IMA: Deadlock in ima_appraise_measurement when /bin/kmod carries a digsig in security.evm Matthias Gerstner
2018-06-19 22:21 ` Mimi Zohar
2018-06-20 10:53 ` Matthias Gerstner
2018-06-22 19:48 ` Mimi Zohar
2018-06-24 22:31 ` Mimi Zohar [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1529879490.3343.4.camel@linux.vnet.ibm.com \
--to=zohar@linux.vnet.ibm.com \
--cc=linux-integrity@vger.kernel.org \
--cc=mgerstner@suse.de \
--cc=viewizard@viewizard.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.