[<prev] [next>] [day] [month] [year] [list]
Message-ID: <alpine.LRH.2.20.1610060046330.29486@math.ut.ee>
Date: Thu, 6 Oct 2016 01:05:11 +0300 (EEST)
From: Meelis Roos <mroos@...ux.ee>
To: Linux Kernel list <linux-kernel@...r.kernel.org>,
linux-ia64@...r.kernel.org
Subject: 4.8 ia64: usercopy: kernel memory exposure attempt detected
This is 4.8 on HP rx2620, with usercopy checks. How do I find out the
culprit?
[ 9.013642] VFS: Mounted root (ext4 filesystem) readonly on device 8:3.
[ 9.033645] devtmpfs: mounted
[ 9.033645] Freeing unused kernel memory: 800K (e000000004b38000 - e000000004c00000)
[ 9.033645] This architecture does not have kernel memory protection.
[ 9.149645] usercopy: kernel memory exposure attempt detected from e000000100888000 (<linear kernel text>) (832 bytes)
[ 9.149645] kernel BUG at mm/usercopy.c:75!
[ 9.149645] init[1]: bugcheck! 0 [1]
[ 9.149645] Modules linked in:
[ 9.149645]
[ 9.149645] CPU: 0 PID: 1 Comm: init Not tainted 4.8.0 #45
[ 9.149645] Hardware name: hp server rx2620 , BIOS 04.29 11/30/2007
[ 9.149645] task: e000004083208000 task.stack: e000004083208000
[ 9.149645] psr : 0000101008026010 ifs : 800000000000038d ip : [<a000000100233760>] Not tainted (4.8.0)
[ 9.149645] ip is at __check_object_size+0xe0/0x520
[ 9.149645] unat: 0000000000000000 pfs : 000000000000038d rsc : 0000000000000003
[ 9.149645] rnat: 0000000000000000 bsps: 0000000000000000 pr : 000000000005ca99
[ 9.149645] ldrs: 0000000000000000 ccv : 00000002215c8332 fpsr: 0009804c8a70033f
[ 9.149645] csd : 0000000000000000 ssd : 0000000000000000
[ 9.149645] b0 : a000000100233760 b6 : a0000001006e6ba0 b7 : a00000010065b580
[ 9.149645] f6 : 000000000000000000000 f7 : 1003e0044b82fa09b5a53
[ 9.149645] f8 : 1003e0000000000004932 f9 : 1003e00000000011d6d26
[ 9.149645] f10 : 1003e20c49ba5e353f7cf f11 : 1003e00000000002488d9
[ 9.149645] r1 : a000000100ef5af0 r2 : a000000100cbda00 r3 : a000000100cbda08
[ 9.149645] r8 : 000000000000001f r9 : 0000000000000dc4 r10 : a000000100cd3958
[ 9.149645] r11 : ffffffffffffffff r12 : e00000408320fd70 r13 : e000004083208000
[ 9.149645] r14 : a000000100cf6438 r15 : a000000100cbda08 r16 : a000000100cbda30
[ 9.149645] r17 : 0000000000007fff r18 : 000000000dc206e1 r19 : 000000000000013c
[ 9.149645] r20 : 0000000000000003 r21 : 0000000000000000 r22 : 0000000000000000
[ 9.149645] r23 : 0000000000000dc0 r24 : 0000000000000021 r25 : 0000000000006c80
[ 9.149645] r26 : 0000000000000dc0 r27 : 0000000000000dc0 r28 : a000000100d1c7c8
[ 9.149645] r29 : a00000010052b400 r30 : 0000000000000001 r31 : 0000000000000894
[ 9.149645]
[ 9.149645] Call Trace:
[ 9.149645] [<a0000001000131d0>] show_stack+0x90/0xc0
[ 9.149645] sp=e00000408320f920 bsp=e000004083209340
[ 9.149645] Disabling lock debugging due to kernel taint
[ 9.293651] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
[ 9.293651]
[ 9.293651] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
--
Meelis Roos (mroos@...ux.ee)
Powered by blists - more mailing lists