Situation: I analyzed a HDD with a Windows 10 wich was infected by a
Backdoor.As I wanted to see if ClamAV detects the Malware too and I
wanted to see how long it takes to do the Scan with OpenBSDI attached the
HDD to a OpenBSD-System and got a Kernel panic, TWICE doing so.... I
mounted the NTFS-Partition (to /mnt) and just let ClamScan scan the whole
drive.Since I had to wipe the HDD I can not provide a DD-Image. Since the
wipe was flawless (used the SCHNEIER (7-pass) Method) the HDD is alright.
I also used Vendor-Tools to check the HDD for any Malfunction (SeaTools)
but found none so I assume the issue is in the NTFS-Code in OpenBSD.
System is an PC Engines APU1, 4GB (no dmesg), HDD was attached via USB.
Do not mind the TOR-Process, it was installed after the 1st crash because
I had to test something else and run a second Trial (with the HDD) later
(to let ClamScan scan the Drive on OpenBSD). kernel: protection fault
trap, code=0
Stopped at  ntfs_readattr_plain+0x131:  movl  0x60(%rax),%edx
ddb{1}> ps
 PID TID PPID  UID  S FLAGS  WAIT  COMMAND
 45415  265988  52456  0  3 0x2  biowait perl
 52456  447493 4322  0  3  0x10008a  sigsusp sh
4322  437081  35962  0  3  0x10008a  sigsusp sh
 35962  459242  38655  0  3  0x100090  piperd  cron
*43302  184321  19396  0  7  0x800403  clamscan
 19396  353567  1  0  3  0x10008b  sigsusp ksh
 38655  409127  1  0  3  0x100098  kqread  cron
 85565  274846  1  566  3  0x90  kqread  tor
 39491  404941  1 99  3 0x1100090  kqread  sndiod
 62633  236452  1  110  3  0x100090  kqread  sndiod
 97546  214477  33817 95  3 0x1100092  kqread  smtpd
 20834  408466  33817  103  3 0x1100092  kqread  smtpd
 10786  385614  33817 95  3 0x1100092  kqread  smtpd
 90964 76202  33817 95  3  0x100092  kqread  smtpd
 59751  327464  33817 95  3 0x1100092  kqread  smtpd
 44792  162808  33817 95  3 0x1100092  kqread  smtpd
 33817 92588  1  0  3  0x100080  kqread  smtpd
 25534  190445  1  0  3  0x88  kqread  sshd
 81744  209992  1  0  3  0x100080  kqread  ntpd
 30655  211583  54372 83  3  0x100092  kqread  ntpd
 54372  459931  1 83  3 0x1100092  kqread  ntpd
25018  516458  1 53  3 0x1000090  kqread  unbound
 21697  267844  35848 74  3 0x1100092  bpf pflogd
 35848 81368  1  0  3  0x80  netio pflogd
 96653  410785  66669 73  3 0x1100090  kqread  syslogd
 66669  450929  1  0  3  0x100082  netio syslogd
 56318  318748  1  0  3  0x100080  kqread  resolvd
 96192  386048  64537 77  3  0x100092  kqread  dhcpleased
 36462  200448  64537 77  3  0x100092  kqread  dhcpleased
 64537  264634  1  0  3  0x80  kqread  dhcpleased
 82427  268078  91758  115  3  0x100092  kqread  slaacd
 27797  320182  91758  115  3  0x100092  kqread  slaacd
 91758  346220  1  0  3  0x100080  kqread  slaacd
 35354 84793  0  0  3 0x14200  bored smr
 74931  129718  0  0  3 0x14200  pgzero  zerothread
 83218  357793  0  0  3 0x14200  aiodoned  aiodoned
 23298 95388  0  0  3 0x14200  syncer  update
 71279  420621  0  0  3 0x14200  cleaner cleaner
2921 66629  0  0  3 0x14200  reaper  reaper
 77209  395044  0  0  3 0x14200  pgdaemon  pagedaemon
 43392  394253  0  0  3 0x14200  bored sensors
 88002  368253  0  0  3 0x14200  usbtsk  usbtask
 30426  238822  0  0  3 0x14200  usbatsk usbatsk
 39061  434090  0  0  3  0x40014200  acpi0 acpi0
 63789  355878  0  0  3  0x40014200  idle1
 89634  277095  0  0  3 0x14200  bored softnet
5946 42525  0  0  3 0x14200  bored systqmp
 11144  229937  0  0  3 0x14200  bored systq
 73833  505314  0  0  3  0x40014200  bored softclock
5759  111706  0  0  7  0x40014200  idle0
 1  106210  0  0  3  0x82  wait  init
 0 0 -1  0  3 0x10200  scheduler swapper
ddb{1}> trace
ntfs_readattr_plain(ffff800000da1600,ffff800002a0bb00,80,0,1000,d799,81ca14246f
acdb2a,ffff800002a0bb00,1000) at ntfs_readattr_plain+0x131
ntfs_readattr(ffff800000da1600,ffff800002a0bb00,80,0,1000,d799,cd7915280e96d8b2
,fffffd80632fad30) at ntfs_readattr+0x1bc
ntfs_read(ffff800021f6eb08) at ntfs_read+0x63
VOP_READ(fffffd806629e4f8,ffff800021f6ec68,0,fffffd817e7e4060) at
VOP_READ+0x41vn_read(fffffd80632fad30,ffff800021f6ec68,1) at vn_read+0xa6
dofilereadv(ffff8000ffff6548,9,ffff800021f6ec68,1,ffff800021f6ed30) at
dofilere
adv+0x146
sys_pread(ffff8000ffff6548,ffff800021f6ece0,ffff800021f6ed30) at
sys_pread+0x5csyscall(ffff800021f6eda0) at syscall+0x374
Xsyscall() at Xsyscall+0x128
end of kernel
end trace frame: 0x7f7ffffbcc80, count: -9
ddb{1}> show register
rdi  0
rsi 0xc9c8  __ALIGN_SIZE+0xb9c8
rbp 0xffff800021f6e9b0
rbx 0xd799  __ALIGN_SIZE+0xc799
rdx 0xfe00000000000000
rcx  0x282
rax 0xdead4110dead4110
r8 0
r9  0xd799  __ALIGN_SIZE+0xc799
r10 0x1000  __ALIGN_SIZE
r11 0x64b4f01def25acfb
r12 0x80
r13 0xffff800002a0bb00
r14 0x1000  __ALIGN_SIZE
r15 0xffff800000da1600
rip 0xffffffff81689041  ntfs_readattr_plain+0x131
cs 0x8
rflags 0x10246  __ALIGN_SIZE+0xf246
rsp 0xffff800021f6e920
ss  0x10
ntfs_readattr_plain+0x131:  movl  0x60(%rax),%edx
ddb{1}>
Kind regards,Sebastian Rother

Reply via email to