[Bug 1156053] [20191018] Kernel memory overwrite attempt detected to SLUB object - illegal operation
http://bugzilla.suse.com/show_bug.cgi?id=1156053
http://bugzilla.suse.com/show_bug.cgi?id=1156053#c21
Berthold Gunreben
(In reply to Berthold Gunreben from comment #19)
[76689.101056] kernel BUG at mm/usercopy.c:99!
You cut the interesting part: what's one line above this?
Sorry, it actually said cut here, but I guess you want to see the line above. I just reproduced, and paste the full output: [ 33.243667] usercopy: Kernel memory exposure attempt detected from SLUB object 'dma-kmalloc-128' (offset 0, size 64)! [ 33.243685] ------------[ cut here ]------------ [ 33.243687] kernel BUG at mm/usercopy.c:99! [ 33.243701] illegal operation: 0001 ilc:1 [#1] SMP [ 33.243704] Modules linked in: scsi_transport_iscsi af_packet nf_tables_set nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_tables ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables s390_trng ghash_s390 prng aes_s390 des_s390 des_generic sha512_s390 sha1_s390 vmur qeth_l2 btrfs libcrc32c xor zlib_deflate raid6_pq crc32_vx_s390 sha256_s390 sha_common dasd_diag_mod dasd_fba_mod dasd_eckd_mod dasd_mod qeth qdio ccwgroup sg pkey zcrypt rng_core dm_multipath dm_mod scsi_dh_rdac scsi_dh_emc scsi_dh_alua scsi_mod [ 33.243784] CPU: 0 PID: 1920 Comm: hyptop Not tainted 5.3.12-1-default #1 openSUSE Tumbleweed (unreleased) [ 33.243786] Hardware name: IBM 3906 M04 738 (z/VM 6.4.0) [ 33.243787] Krnl PSW : 0704c00180000000 000000003d605f9a (usercopy_abort+0xaa/0xb0) [ 33.243794] R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 [ 33.243797] Krnl GPRS: 000000000000006a 000000003e0a6bc8 0000000000000069 000000003f34fa08 [ 33.243799] 000000003f360300 0000000000000000 000000003dd7d088 0000000000000040 [ 33.243801] 0000000000000000 000000000000001c 0000000000000000 000000003dd6dc88 [ 33.243803] 0000000029d68000 0000000000001b50 000000003d605f96 000003e00087bbc8 [ 33.243810] Krnl Code: 000000003d605f8a: c020003bb8b6 larl %r2,3dd7d0f6 000000003d605f90: c0e5fff123a8 brasl %r14,3d42a6e0 #000000003d605f96: a7f40001 brc 15,3d605f98 >000000003d605f9a: 0707 bcr 0,%r7 000000003d605f9c: 0707 bcr 0,%r7 000000003d605f9e: 0707 bcr 0,%r7 000000003d605fa0: c00400000000 brcl 0,3d605fa0 000000003d605fa6: ebbff0700024 stmg %r11,%r15,112(%r15) [ 33.243911] Call Trace: [ 33.243913] ([<000000003d605f96>] usercopy_abort+0xa6/0xb0) [ 33.243917] [<000000003d5dd3e0>] __check_heap_object+0x130/0x150 [ 33.243919] [<000000003d605e7c>] __check_object_size+0x18c/0x200 [ 33.243922] [<000000003d6406ec>] simple_read_from_buffer+0x5c/0xb0 [ 33.243927] [<000000003d3a06f0>] dbfs_read+0xd0/0x140 [ 33.243930] [<000000003d74af2c>] full_proxy_read+0x7c/0xd0 [ 33.243933] [<000000003d60c234>] vfs_read+0x94/0x150 [ 33.243937] [<000000003d60c608>] ksys_read+0x68/0x100 [ 33.243941] [<000000003dbd5598>] system_call+0xdc/0x2c8 [ 33.243943] Last Breaking-Event-Address: [ 33.243946] [<000000003d605f96>] usercopy_abort+0xa6/0xb0 [ 33.243949] ---[ end trace 68c9506c6dda8047 ]--- Anything above this output was the result from booting and did not show errors. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com