PAX size overflow in velocity_rx_refill

Discuss usability issues, general maintenance, and general support issues for a grsecurity-enabled system.

PAX size overflow in velocity_rx_refill

Postby quasar366 » Sat May 14, 2016 10:20 am

Once again on my desktop system ubuntu 16.04 64 Bit / systemd - gcc version 5.3.1 20160413 (Ubuntu 5.3.1-14ubuntu2) with latest patch 3.1-4.5.4-201605131918.patch. The previous 20160512... was working

Code: Select all
kernel: [   15.070134] device enp4s0 entered promiscuous mode
kernel: [   15.072515] PAX: size overflow detected in function velocity_rx_refill drivers/net/ethernet/via/via-velocity.c:1547 cicus.1046_125 min, count: 20, decl: size; num: 0; context: rx_desc;
kernel: [   15.072519] CPU: 2 PID: 761 Comm: ip Not tainted 4.5.4-default #1
kernel: [   15.072520] Hardware name: ASUS All Series/Z87M-PLUS, BIOS 1107 11/04/2014
kernel: [   15.072521]  0000000000000246 c84e3c2c86f3d6ff ffffc90003bcb560 ffffffff9849292c
kernel: [   15.072524]  000000000000060b c84e3c2c86f3d6ff ffffffffc00ddac8 000000000000060b
kernel: [   15.072525]  ffffc90003bcb590 ffffffff982475ec ffff880680ab4000 0000000000000000
kernel: [   15.072527] Call Trace:
kernel: [   15.072532]  [<ffffffff9849292c>] dump_stack+0x60/0xb4
kernel: [   15.072537]  [<ffffffffc00ddac8>] ? velocity_ethtool_ops+0x7a8/0xb80 [via_velocity]
kernel: [   15.072541]  [<ffffffff982475ec>] report_size_overflow+0x6c/0x90
kernel: [   15.072543]  [<ffffffffc00db7ab>] velocity_rx_refill+0x20b/0x2f0 [via_velocity]
kernel: [   15.072546]  [<ffffffff98618080>] ? __intel_map_single+0x1a0/0x1a0
kernel: [   15.072548]  [<ffffffffc00dc02a>] velocity_init_rings+0x21a/0x430 [via_velocity]
kernel: [   15.072550]  [<ffffffffc00dc601>] velocity_open+0x21/0x11d [via_velocity]
kernel: [   15.072552]  [<ffffffffc00dcd00>] ? velocity_pm_ops+0xc0/0xc0 [via_velocity]
kernel: [   15.072555]  [<ffffffff98832d0d>] __dev_open+0xfd/0x190
kernel: [   15.072557]  [<ffffffff988330cd>] __dev_change_flags+0xcd/0x1b0
kernel: [   15.072558]  [<ffffffff988331d4>] dev_change_flags+0x24/0x80
kernel: [   15.072560]  [<ffffffff98846313>] do_setlink+0x753/0xd30
kernel: [   15.072562]  [<ffffffffc00dcd00>] ? velocity_pm_ops+0xc0/0xc0 [via_velocity]
kernel: [   15.072565]  [<ffffffffc0098af0>] ? kcryptd_io_read+0x90/0xe0 [dm_crypt]
kernel: [   15.072568]  [<ffffffff981a27b7>] ? mempool_alloc+0x87/0x1b0
kernel: [   15.072569]  [<ffffffff981a27b7>] ? mempool_alloc+0x87/0x1b0
kernel: [   15.072577]  [<ffffffffc062f7e0>] ? br_port_state_names+0x40/0x40 [bridge]
kernel: [   15.072578]  [<ffffffff98847daa>] rtnl_newlink+0x62a/0x920
kernel: [   15.072579]  [<ffffffff984927fc>] ? cpumask_any_but+0x2c/0x60
kernel: [   15.072582]  [<ffffffff980702cb>] ? flush_tlb_page+0x4b/0x1e0
kernel: [   15.072585]  [<ffffffff9822f1d6>] ? mem_cgroup_commit_charge+0x76/0x100
kernel: [   15.072587]  [<ffffffff981b26f1>] ? lru_cache_add_active_or_unevictable+0x31/0xc0
kernel: [   15.072589]  [<ffffffff981d836a>] ? wp_page_copy.isra.76+0x29a/0x680
kernel: [   15.072592]  [<ffffffff984d0262>] ? nla_parse+0x32/0x110
kernel: [   15.072596]  [<ffffffffc062f7e0>] ? br_port_state_names+0x40/0x40 [bridge]
kernel: [   15.072597]  [<ffffffff98847ba5>] ? rtnl_newlink+0x425/0x920
kernel: [   15.072600]  [<ffffffff98480a07>] ? gr_is_capable+0x17/0x40
kernel: [   15.072603]  [<ffffffff9808bac1>] ? ns_capable+0x41/0x80
kernel: [   15.072604]  [<ffffffff98844e6f>] rtnetlink_rcv_msg+0xaf/0x270
kernel: [   15.072606]  [<ffffffff9824793f>] ? __check_object_size.part.39+0x2f/0x1f0
kernel: [   15.072609]  [<ffffffff988110a9>] ? __alloc_skb+0x89/0x300
kernel: [   15.072610]  [<ffffffff98844dc0>] ? rtnetlink_rcv+0x50/0x50
kernel: [   15.072612]  [<ffffffff98875d3b>] netlink_rcv_skb+0xfb/0x160
kernel: [   15.072613]  [<ffffffff98844d93>] rtnetlink_rcv+0x23/0x50
kernel: [   15.072614]  [<ffffffff9887512c>] netlink_unicast+0x14c/0x200
kernel: [   15.072616]  [<ffffffff98875702>] netlink_sendmsg+0x522/0x830
kernel: [   15.072617]  [<ffffffff988044f5>] sock_sendmsg+0x55/0x80
kernel: [   15.072619]  [<ffffffff98805b8b>] ___sys_sendmsg+0x29b/0x2c0
kernel: [   15.072621]  [<ffffffff9822f1d6>] ? mem_cgroup_commit_charge+0x76/0x100
kernel: [   15.072623]  [<ffffffff9822e8f7>] ? mem_cgroup_try_charge+0x67/0x1a0
kernel: [   15.072624]  [<ffffffff981b26f1>] ? lru_cache_add_active_or_unevictable+0x31/0xc0
kernel: [   15.072626]  [<ffffffff9825e5b2>] ? __dentry_kill+0x1b2/0x280
kernel: [   15.072628]  [<ffffffff9826a36f>] ? mntput+0x1f/0x50
kernel: [   15.072630]  [<ffffffff98241759>] ? __fput+0x1b9/0x290
kernel: [   15.072631]  [<ffffffff9880778c>] __sys_sendmsg+0x4c/0xa0
kernel: [   15.072632]  [<ffffffff988077ed>] sys_sendmsg+0xd/0x40
kernel: [   15.072635]  [<ffffffff989815e4>] entry_SYSCALL_64_fastpath+0x16/0x73

regards
quasar366
 
Posts: 36
Joined: Mon Dec 02, 2013 2:26 pm

Return to grsecurity support