lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <alpine.LRH.2.20.1610060046330.29486@math.ut.ee>
Date:   Thu, 6 Oct 2016 01:05:11 +0300 (EEST)
From:   Meelis Roos <mroos@...ux.ee>
To:     Linux Kernel list <linux-kernel@...r.kernel.org>,
        linux-ia64@...r.kernel.org
Subject: 4.8 ia64: usercopy: kernel memory exposure attempt detected

This is 4.8 on HP rx2620, with usercopy checks. How do I find out the 
culprit?

[    9.013642] VFS: Mounted root (ext4 filesystem) readonly on device 8:3.
[    9.033645] devtmpfs: mounted
[    9.033645] Freeing unused kernel memory: 800K (e000000004b38000 - e000000004c00000)
[    9.033645] This architecture does not have kernel memory protection.
[    9.149645] usercopy: kernel memory exposure attempt detected from e000000100888000 (<linear kernel text>) (832 bytes)
[    9.149645] kernel BUG at mm/usercopy.c:75!
[    9.149645] init[1]: bugcheck! 0 [1]
[    9.149645] Modules linked in:
[    9.149645] 
[    9.149645] CPU: 0 PID: 1 Comm: init Not tainted 4.8.0 #45
[    9.149645] Hardware name: hp server rx2620                   , BIOS 04.29                                                            11/30/2007          
[    9.149645] task: e000004083208000 task.stack: e000004083208000
[    9.149645] psr : 0000101008026010 ifs : 800000000000038d ip  : [<a000000100233760>]    Not tainted (4.8.0)
[    9.149645] ip is at __check_object_size+0xe0/0x520
[    9.149645] unat: 0000000000000000 pfs : 000000000000038d rsc : 0000000000000003
[    9.149645] rnat: 0000000000000000 bsps: 0000000000000000 pr  : 000000000005ca99
[    9.149645] ldrs: 0000000000000000 ccv : 00000002215c8332 fpsr: 0009804c8a70033f
[    9.149645] csd : 0000000000000000 ssd : 0000000000000000
[    9.149645] b0  : a000000100233760 b6  : a0000001006e6ba0 b7  : a00000010065b580
[    9.149645] f6  : 000000000000000000000 f7  : 1003e0044b82fa09b5a53
[    9.149645] f8  : 1003e0000000000004932 f9  : 1003e00000000011d6d26
[    9.149645] f10 : 1003e20c49ba5e353f7cf f11 : 1003e00000000002488d9
[    9.149645] r1  : a000000100ef5af0 r2  : a000000100cbda00 r3  : a000000100cbda08
[    9.149645] r8  : 000000000000001f r9  : 0000000000000dc4 r10 : a000000100cd3958
[    9.149645] r11 : ffffffffffffffff r12 : e00000408320fd70 r13 : e000004083208000
[    9.149645] r14 : a000000100cf6438 r15 : a000000100cbda08 r16 : a000000100cbda30
[    9.149645] r17 : 0000000000007fff r18 : 000000000dc206e1 r19 : 000000000000013c
[    9.149645] r20 : 0000000000000003 r21 : 0000000000000000 r22 : 0000000000000000
[    9.149645] r23 : 0000000000000dc0 r24 : 0000000000000021 r25 : 0000000000006c80
[    9.149645] r26 : 0000000000000dc0 r27 : 0000000000000dc0 r28 : a000000100d1c7c8
[    9.149645] r29 : a00000010052b400 r30 : 0000000000000001 r31 : 0000000000000894
[    9.149645] 
[    9.149645] Call Trace:
[    9.149645]  [<a0000001000131d0>] show_stack+0x90/0xc0
[    9.149645]                                 sp=e00000408320f920 bsp=e000004083209340
[    9.149645] Disabling lock debugging due to kernel taint
[    9.293651] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
[    9.293651] 
[    9.293651] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b


-- 
Meelis Roos (mroos@...ux.ee)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ