linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* 4.8 ia64: usercopy: kernel memory exposure attempt detected
@ 2016-10-05 22:05 Meelis Roos
  0 siblings, 0 replies; only message in thread
From: Meelis Roos @ 2016-10-05 22:05 UTC (permalink / raw)
  To: Linux Kernel list, linux-ia64

This is 4.8 on HP rx2620, with usercopy checks. How do I find out the 
culprit?

[    9.013642] VFS: Mounted root (ext4 filesystem) readonly on device 8:3.
[    9.033645] devtmpfs: mounted
[    9.033645] Freeing unused kernel memory: 800K (e000000004b38000 - e000000004c00000)
[    9.033645] This architecture does not have kernel memory protection.
[    9.149645] usercopy: kernel memory exposure attempt detected from e000000100888000 (<linear kernel text>) (832 bytes)
[    9.149645] kernel BUG at mm/usercopy.c:75!
[    9.149645] init[1]: bugcheck! 0 [1]
[    9.149645] Modules linked in:
[    9.149645] 
[    9.149645] CPU: 0 PID: 1 Comm: init Not tainted 4.8.0 #45
[    9.149645] Hardware name: hp server rx2620                   , BIOS 04.29                                                            11/30/2007          
[    9.149645] task: e000004083208000 task.stack: e000004083208000
[    9.149645] psr : 0000101008026010 ifs : 800000000000038d ip  : [<a000000100233760>]    Not tainted (4.8.0)
[    9.149645] ip is at __check_object_size+0xe0/0x520
[    9.149645] unat: 0000000000000000 pfs : 000000000000038d rsc : 0000000000000003
[    9.149645] rnat: 0000000000000000 bsps: 0000000000000000 pr  : 000000000005ca99
[    9.149645] ldrs: 0000000000000000 ccv : 00000002215c8332 fpsr: 0009804c8a70033f
[    9.149645] csd : 0000000000000000 ssd : 0000000000000000
[    9.149645] b0  : a000000100233760 b6  : a0000001006e6ba0 b7  : a00000010065b580
[    9.149645] f6  : 000000000000000000000 f7  : 1003e0044b82fa09b5a53
[    9.149645] f8  : 1003e0000000000004932 f9  : 1003e00000000011d6d26
[    9.149645] f10 : 1003e20c49ba5e353f7cf f11 : 1003e00000000002488d9
[    9.149645] r1  : a000000100ef5af0 r2  : a000000100cbda00 r3  : a000000100cbda08
[    9.149645] r8  : 000000000000001f r9  : 0000000000000dc4 r10 : a000000100cd3958
[    9.149645] r11 : ffffffffffffffff r12 : e00000408320fd70 r13 : e000004083208000
[    9.149645] r14 : a000000100cf6438 r15 : a000000100cbda08 r16 : a000000100cbda30
[    9.149645] r17 : 0000000000007fff r18 : 000000000dc206e1 r19 : 000000000000013c
[    9.149645] r20 : 0000000000000003 r21 : 0000000000000000 r22 : 0000000000000000
[    9.149645] r23 : 0000000000000dc0 r24 : 0000000000000021 r25 : 0000000000006c80
[    9.149645] r26 : 0000000000000dc0 r27 : 0000000000000dc0 r28 : a000000100d1c7c8
[    9.149645] r29 : a00000010052b400 r30 : 0000000000000001 r31 : 0000000000000894
[    9.149645] 
[    9.149645] Call Trace:
[    9.149645]  [<a0000001000131d0>] show_stack+0x90/0xc0
[    9.149645]                                 sp=e00000408320f920 bsp=e000004083209340
[    9.149645] Disabling lock debugging due to kernel taint
[    9.293651] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
[    9.293651] 
[    9.293651] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b


-- 
Meelis Roos (mroos@linux.ee)

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2016-10-05 20:34 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-10-05 22:05 4.8 ia64: usercopy: kernel memory exposure attempt detected Meelis Roos

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).