Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 4 Jun 2020 21:04:11 +0200
From: Jacek <wampir990@...il.com>
To: lkrg-users@...ts.openwall.com
Subject: Re: Re: Support for 5.7 linux kernel?

Hi

I compiled LKRG with the latest commit.

LKRG version:

filename:       /lib/modules/5.7.0-g2/extra/p_lkrg.ko
license:        GPL v2
description:    pi3's Linux kernel Runtime Guard
author:         Adam 'pi3' Zabrocki (http://pi3.com.pl)
srcversion:     A71A9D244825DC212087199
depends:       
retpoline:      Y
name:           p_lkrg
vermagic:       5.7.0-g2 SMP preempt mod_unload modversions
RANDSTRUCT_PLUGIN_ef6c602da94c0b38ee3353aa970b02005c9506ccfd022b488b7fcd548de3c84c


modprobe says:

# G1 Gentuś ###   czw cze 04 20:48:11  domek : /ssdtmp/lkrg-main

# root ~> modprobe -v  p_lkrg
insmod /lib/modules/5.7.0-g2/extra/p_lkrg.ko
[  188.472797] [p_lkrg] Loading LKRG...
[  197.737401] [p_lkrg] Can't initialize exploit detection features!
Exiting...
modprobe: ERROR: could not insert 'p_lkrg': No buffer space available

dmesg says:

[  188.472797] [p_lkrg] Loading LKRG...
[  188.474574] BUG: using smp_processor_id() in preemptible [00000000]
code: modprobe/9545
[  188.474581] caller is p_parse_module_params+0x15c/0x287 [p_lkrg]
[  188.474582] CPU: 1 PID: 9545 Comm: modprobe Tainted: G         C O   
T 5.7.0-g2 #3
[  188.474582] Hardware name: Gigabyte Technology Co., Ltd.
Z97-D3H/Z97-D3H-CF, BIOS F9 09/18/2015
[  188.474583] Call Trace:
[  188.474587]  dump_stack+0x50/0x68
[  188.474589]  debug_smp_processor_id.cold+0x4d/0x52
[  188.474594]  p_parse_module_params+0x15c/0x287 [p_lkrg]
[  188.474599]  p_lkrg_register+0x4b/0x1000 [p_lkrg]
[  188.474600]  ? 0xffffffffc0331000
[  188.474602]  do_one_initcall+0x56/0x230
[  188.474605]  do_init_module+0x59/0x210
[  188.474607]  load_module+0x2378/0x2700
[  188.474610]  ? __do_sys_finit_module+0xd7/0xf0
[  188.474611]  __do_sys_finit_module+0xd7/0xf0
[  188.474613]  do_syscall_64+0x94/0x220
[  188.474615]  ? do_syscall_64+0x27/0x220
[  188.474618]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  188.474619] RIP: 0033:0x7fdb7e4aa509
[  188.474620] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f
05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 57 09 0c 00 f7 d8 64 89 01 48
[  188.474621] RSP: 002b:00007ffd5a503d08 EFLAGS: 00000246 ORIG_RAX:
0000000000000139
[  188.474622] RAX: ffffffffffffffda RBX: 000055f39e425b20 RCX:
00007fdb7e4aa509
[  188.474622] RDX: 0000000000000000 RSI: 000055f39d2e0390 RDI:
0000000000000003
[  188.474623] RBP: 0000000000040000 R08: 0000000000000000 R09:
000055f39e427840
[  188.474623] R10: 0000000000000003 R11: 0000000000000246 R12:
000055f39d2e0390
[  188.474624] R13: 0000000000000000 R14: 000055f39e425c50 R15:
0000000000000000
[  188.474625] BUG: using smp_processor_id() in preemptible [00000000]
code: modprobe/9545
[  188.474630] caller is p_parse_module_params+0x1af/0x287 [p_lkrg]
[  188.474630] CPU: 1 PID: 9545 Comm: modprobe Tainted: G         C O   
T 5.7.0-g2 #3
[  188.474631] Hardware name: Gigabyte Technology Co., Ltd.
Z97-D3H/Z97-D3H-CF, BIOS F9 09/18/2015
[  188.474631] Call Trace:
[  188.474632]  dump_stack+0x50/0x68
[  188.474633]  debug_smp_processor_id.cold+0x4d/0x52
[  188.474638]  p_parse_module_params+0x1af/0x287 [p_lkrg]
[  188.474642]  p_lkrg_register+0x4b/0x1000 [p_lkrg]
[  188.474642]  ? 0xffffffffc0331000
[  188.474643]  do_one_initcall+0x56/0x230
[  188.474645]  do_init_module+0x59/0x210
[  188.474646]  load_module+0x2378/0x2700
[  188.474649]  ? __do_sys_finit_module+0xd7/0xf0
[  188.474650]  __do_sys_finit_module+0xd7/0xf0
[  188.474652]  do_syscall_64+0x94/0x220
[  188.474654]  ? do_syscall_64+0x27/0x220
[  188.474655]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  188.474656] RIP: 0033:0x7fdb7e4aa509
[  188.474656] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00
48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f
05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 57 09 0c 00 f7 d8 64 89 01 48
[  188.474657] RSP: 002b:00007ffd5a503d08 EFLAGS: 00000246 ORIG_RAX:
0000000000000139
[  188.474658] RAX: ffffffffffffffda RBX: 000055f39e425b20 RCX:
00007fdb7e4aa509
[  188.474658] RDX: 0000000000000000 RSI: 000055f39d2e0390 RDI:
0000000000000003
[  188.474659] RBP: 0000000000040000 R08: 0000000000000000 R09:
000055f39e427840
[  188.474659] R10: 0000000000000003 R11: 0000000000000246 R12:
000055f39d2e0390
[  188.474659] R13: 0000000000000000 R14: 000055f39e425c50 R15:
0000000000000000
[  188.474661] [p_lkrg] System does NOT support SMAP. LKRG can't enforce
SMAP validation :(
[  188.486717] Freezing user space processes ... (elapsed 0.001 seconds)
done.
[  188.488347] OOM killer disabled.
[  188.488372] [p_lkrg] 4/23 UMH paths were whitelisted...
[  192.099076] [p_lkrg] [kretprobe] register_kretprobe() for
<ttwu_do_wakeup> failed! [err=-22]
[  192.099077] [p_lkrg] ERROR: Can't hook ttwu_do_wakeup :(
[  197.737401] [p_lkrg] Can't initialize exploit detection features!
Exiting...
[  197.770252] OOM killer enabled.
[  197.770253] Restarting tasks ... done.

W dniu 04.06.2020 o 19:42, Adam Zabrocki pisze:
> Hi,
>
> I've just pushed a basic verification if necessary CONFIG_* options are 
> enabled. If I miss something in the latest commit, I will be incrementaly 
> adding them.
>
> Please try to recompile the module and check if it works.
>
> Thanks,
> Adam
>
> On Thu, Jun 04, 2020 at 05:05:51PM +0200, Mikhail Morfikov wrote:
>> On 04/06/2020 15:54, Jacek wrote:
>> ...
>>
>> I also have something similar/the same now when I'm loading the lkrg module:
>>
>>
>>
>> Jun 04 16:58:17 morfikownia kernel: p_lkrg: loading out-of-tree module taints kernel.
>> Jun 04 16:58:17 morfikownia kernel: [p_lkrg] Loading LKRG...
>> Jun 04 16:58:17 morfikownia kernel: [p_lkrg] System does NOT support SMAP. LKRG can't enforce SMAP validation :(
>> Jun 04 16:58:17 morfikownia kernel: Freezing user space processes ... (elapsed 0.016 seconds) done.
>> Jun 04 16:58:17 morfikownia kernel: OOM killer disabled.
>> Jun 04 16:58:17 morfikownia kernel: [p_lkrg] 8/23 UMH paths were whitelisted...
>> Jun 04 16:58:17 morfikownia kernel: [p_lkrg] [kretprobe] register_kretprobe() for <ttwu_do_wakeup> failed! [err=-22]
>> Jun 04 16:58:17 morfikownia kernel: [p_lkrg] ERROR: Can't hook ttwu_do_wakeup :(
>> Jun 04 16:58:17 morfikownia kernel: =============================================================================
>> Jun 04 16:58:17 morfikownia kernel: BUG p_ed_pids (Tainted: G           O    T): Objects remaining in p_ed_pids on __kmem_cache_shutdown()
>> Jun 04 16:58:17 morfikownia kernel: -----------------------------------------------------------------------------
>> Jun 04 16:58:17 morfikownia kernel: Disabling lock debugging due to kernel taint
>> Jun 04 16:58:17 morfikownia kernel: INFO: Slab 0x00000000f876039f objects=32 used=1 fp=0x00000000cab2f402 flags=0x2ffe00000010200
>> Jun 04 16:58:17 morfikownia kernel: CPU: 3 PID: 5515 Comm: modprobe Tainted: G    B      O    T 5.7.0-amd64 #4
>> Jun 04 16:58:17 morfikownia kernel: Hardware name: LENOVO 2349BM5/2349BM5, BIOS G1ETC2WW (2.82 ) 08/07/2019
>> Jun 04 16:58:17 morfikownia kernel: Call Trace:
>> Jun 04 16:58:17 morfikownia kernel:  dump_stack+0x50/0x68
>> Jun 04 16:58:17 morfikownia kernel:  slab_err+0xdc/0x103
>> Jun 04 16:58:17 morfikownia kernel:  ? slub_cpu_dead+0xa0/0xa0
>> Jun 04 16:58:17 morfikownia kernel:  __kmem_cache_shutdown.cold+0x31/0x13a
>> Jun 04 16:58:17 morfikownia kernel:  shutdown_cache+0x16/0x1b0
>> Jun 04 16:58:17 morfikownia kernel:  kmem_cache_destroy+0x229/0x250
>> Jun 04 16:58:17 morfikownia kernel:  p_delete_rb_ed_pids+0x8f/0xb0 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_exploit_detection_exit+0x48/0x60 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_exploit_detection_init+0x339/0x3a0 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_lkrg_register+0x1b0/0x1000 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  ? 0xffffffffc0573000
>> Jun 04 16:58:17 morfikownia kernel:  do_one_initcall+0x5b/0x240
>> Jun 04 16:58:17 morfikownia kernel:  do_init_module+0x5f/0x230
>> Jun 04 16:58:17 morfikownia kernel:  load_module+0x26f7/0x29d0
>> Jun 04 16:58:17 morfikownia kernel:  ? __do_sys_finit_module+0xc2/0x120
>> Jun 04 16:58:17 morfikownia kernel:  __do_sys_finit_module+0xc2/0x120
>> Jun 04 16:58:17 morfikownia kernel:  do_syscall_64+0xa4/0x5e7
>> Jun 04 16:58:17 morfikownia kernel:  ? do_syscall_64+0x30/0x5e7
>> Jun 04 16:58:17 morfikownia kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
>> Jun 04 16:58:17 morfikownia kernel: RIP: 0033:0x7f040945ef79
>> Jun 04 16:58:17 morfikownia kernel: Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e7 3e 0c 00 f7 d8 64 89 01 48
>> Jun 04 16:58:17 morfikownia kernel: RSP: 002b:00007fff1eaee8e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
>> Jun 04 16:58:17 morfikownia kernel: RAX: ffffffffffffffda RBX: 00005e56a867eef0 RCX: 00007f040945ef79
>> Jun 04 16:58:17 morfikownia kernel: RDX: 0000000000000000 RSI: 00005e56a6eee358 RDI: 0000000000000003
>> Jun 04 16:58:17 morfikownia kernel: RBP: 0000000000040000 R08: 0000000000000000 R09: 00005e56a86803f0
>> Jun 04 16:58:17 morfikownia kernel: R10: 0000000000000003 R11: 0000000000000246 R12: 00005e56a6eee358
>> Jun 04 16:58:17 morfikownia kernel: R13: 0000000000000000 R14: 00005e56a867ee90 R15: 00005e56a867eef0
>> Jun 04 16:58:17 morfikownia kernel: INFO: Object 0x000000001f233985 @offset=576
>> Jun 04 16:58:17 morfikownia kernel: =============================================================================
>> Jun 04 16:58:17 morfikownia kernel: BUG p_ed_pids (Tainted: G    B      O    T): Objects remaining in p_ed_pids on __kmem_cache_shutdown()
>> Jun 04 16:58:17 morfikownia kernel: -----------------------------------------------------------------------------
>> Jun 04 16:58:17 morfikownia kernel: INFO: Slab 0x00000000b0d6792b objects=32 used=1 fp=0x00000000592cd8d9 flags=0x2ffe00000010200
>> Jun 04 16:58:17 morfikownia kernel: CPU: 3 PID: 5515 Comm: modprobe Tainted: G    B      O    T 5.7.0-amd64 #4
>> Jun 04 16:58:17 morfikownia kernel: Hardware name: LENOVO 2349BM5/2349BM5, BIOS G1ETC2WW (2.82 ) 08/07/2019
>> Jun 04 16:58:17 morfikownia kernel: Call Trace:
>> Jun 04 16:58:17 morfikownia kernel:  dump_stack+0x50/0x68
>> Jun 04 16:58:17 morfikownia kernel:  slab_err+0xdc/0x103
>> Jun 04 16:58:17 morfikownia kernel:  __kmem_cache_shutdown.cold+0x31/0x13a
>> Jun 04 16:58:17 morfikownia kernel:  shutdown_cache+0x16/0x1b0
>> Jun 04 16:58:17 morfikownia kernel:  kmem_cache_destroy+0x229/0x250
>> Jun 04 16:58:17 morfikownia kernel:  p_delete_rb_ed_pids+0x8f/0xb0 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_exploit_detection_exit+0x48/0x60 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_exploit_detection_init+0x339/0x3a0 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_lkrg_register+0x1b0/0x1000 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  ? 0xffffffffc0573000
>> Jun 04 16:58:17 morfikownia kernel:  do_one_initcall+0x5b/0x240
>> Jun 04 16:58:17 morfikownia kernel:  do_init_module+0x5f/0x230
>> Jun 04 16:58:17 morfikownia kernel:  load_module+0x26f7/0x29d0
>> Jun 04 16:58:17 morfikownia kernel:  ? __do_sys_finit_module+0xc2/0x120
>> Jun 04 16:58:17 morfikownia kernel:  __do_sys_finit_module+0xc2/0x120
>> Jun 04 16:58:17 morfikownia kernel:  do_syscall_64+0xa4/0x5e7
>> Jun 04 16:58:17 morfikownia kernel:  ? do_syscall_64+0x30/0x5e7
>> Jun 04 16:58:17 morfikownia kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
>> Jun 04 16:58:17 morfikownia kernel: RIP: 0033:0x7f040945ef79
>> Jun 04 16:58:17 morfikownia kernel: Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e7 3e 0c 00 f7 d8 64 89 01 48
>> Jun 04 16:58:17 morfikownia kernel: RSP: 002b:00007fff1eaee8e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
>> Jun 04 16:58:17 morfikownia kernel: RAX: ffffffffffffffda RBX: 00005e56a867eef0 RCX: 00007f040945ef79
>> Jun 04 16:58:17 morfikownia kernel: RDX: 0000000000000000 RSI: 00005e56a6eee358 RDI: 0000000000000003
>> Jun 04 16:58:17 morfikownia kernel: RBP: 0000000000040000 R08: 0000000000000000 R09: 00005e56a86803f0
>> Jun 04 16:58:17 morfikownia kernel: R10: 0000000000000003 R11: 0000000000000246 R12: 00005e56a6eee358
>> Jun 04 16:58:17 morfikownia kernel: R13: 0000000000000000 R14: 00005e56a867ee90 R15: 00005e56a867eef0
>> Jun 04 16:58:17 morfikownia kernel: INFO: Object 0x00000000f48c566e @offset=8256
>> Jun 04 16:58:17 morfikownia kernel: =============================================================================
>> Jun 04 16:58:17 morfikownia kernel: BUG p_ed_pids (Tainted: G    B      O    T): Objects remaining in p_ed_pids on __kmem_cache_shutdown()
>> Jun 04 16:58:17 morfikownia kernel: -----------------------------------------------------------------------------
>> Jun 04 16:58:17 morfikownia kernel: INFO: Slab 0x00000000bf9211db objects=32 used=1 fp=0x00000000f8602c03 flags=0x2ffe00000010200
>> Jun 04 16:58:17 morfikownia kernel: CPU: 3 PID: 5515 Comm: modprobe Tainted: G    B      O    T 5.7.0-amd64 #4
>> Jun 04 16:58:17 morfikownia kernel: Hardware name: LENOVO 2349BM5/2349BM5, BIOS G1ETC2WW (2.82 ) 08/07/2019
>> Jun 04 16:58:17 morfikownia kernel: Call Trace:
>> Jun 04 16:58:17 morfikownia kernel:  dump_stack+0x50/0x68
>> Jun 04 16:58:17 morfikownia kernel:  slab_err+0xdc/0x103
>> Jun 04 16:58:17 morfikownia kernel:  __kmem_cache_shutdown.cold+0x31/0x13a
>> Jun 04 16:58:17 morfikownia kernel:  shutdown_cache+0x16/0x1b0
>> Jun 04 16:58:17 morfikownia kernel:  kmem_cache_destroy+0x229/0x250
>> Jun 04 16:58:17 morfikownia kernel:  p_delete_rb_ed_pids+0x8f/0xb0 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_exploit_detection_exit+0x48/0x60 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_exploit_detection_init+0x339/0x3a0 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_lkrg_register+0x1b0/0x1000 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  ? 0xffffffffc0573000
>> Jun 04 16:58:17 morfikownia kernel:  do_one_initcall+0x5b/0x240
>> Jun 04 16:58:17 morfikownia kernel:  do_init_module+0x5f/0x230
>> Jun 04 16:58:17 morfikownia kernel:  load_module+0x26f7/0x29d0
>> Jun 04 16:58:17 morfikownia kernel:  ? __do_sys_finit_module+0xc2/0x120
>> Jun 04 16:58:17 morfikownia kernel:  __do_sys_finit_module+0xc2/0x120
>> Jun 04 16:58:17 morfikownia kernel:  do_syscall_64+0xa4/0x5e7
>> Jun 04 16:58:17 morfikownia kernel:  ? do_syscall_64+0x30/0x5e7
>> Jun 04 16:58:17 morfikownia kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
>> Jun 04 16:58:17 morfikownia kernel: RIP: 0033:0x7f040945ef79
>> Jun 04 16:58:17 morfikownia kernel: Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e7 3e 0c 00 f7 d8 64 89 01 48
>> Jun 04 16:58:17 morfikownia kernel: RSP: 002b:00007fff1eaee8e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
>> Jun 04 16:58:17 morfikownia kernel: RAX: ffffffffffffffda RBX: 00005e56a867eef0 RCX: 00007f040945ef79
>> Jun 04 16:58:17 morfikownia kernel: RDX: 0000000000000000 RSI: 00005e56a6eee358 RDI: 0000000000000003
>> Jun 04 16:58:17 morfikownia kernel: RBP: 0000000000040000 R08: 0000000000000000 R09: 00005e56a86803f0
>> Jun 04 16:58:17 morfikownia kernel: R10: 0000000000000003 R11: 0000000000000246 R12: 00005e56a6eee358
>> Jun 04 16:58:17 morfikownia kernel: R13: 0000000000000000 R14: 00005e56a867ee90 R15: 00005e56a867eef0
>> Jun 04 16:58:17 morfikownia kernel: INFO: Object 0x0000000024be6f4e @offset=5184
>> Jun 04 16:58:17 morfikownia kernel: =============================================================================
>> Jun 04 16:58:17 morfikownia kernel: BUG p_ed_pids (Tainted: G    B      O    T): Objects remaining in p_ed_pids on __kmem_cache_shutdown()
>> Jun 04 16:58:17 morfikownia kernel: -----------------------------------------------------------------------------
>> Jun 04 16:58:17 morfikownia kernel: INFO: Slab 0x0000000070a58fc0 objects=32 used=1 fp=0x00000000c1d6cdd8 flags=0x2ffe00000010200
>> Jun 04 16:58:17 morfikownia kernel: CPU: 3 PID: 5515 Comm: modprobe Tainted: G    B      O    T 5.7.0-amd64 #4
>> Jun 04 16:58:17 morfikownia kernel: Hardware name: LENOVO 2349BM5/2349BM5, BIOS G1ETC2WW (2.82 ) 08/07/2019
>> Jun 04 16:58:17 morfikownia kernel: Call Trace:
>> Jun 04 16:58:17 morfikownia kernel:  dump_stack+0x50/0x68
>> Jun 04 16:58:17 morfikownia kernel:  slab_err+0xdc/0x103
>> Jun 04 16:58:17 morfikownia kernel:  __kmem_cache_shutdown.cold+0x31/0x13a
>> Jun 04 16:58:17 morfikownia kernel:  shutdown_cache+0x16/0x1b0
>> Jun 04 16:58:17 morfikownia kernel:  kmem_cache_destroy+0x229/0x250
>> Jun 04 16:58:17 morfikownia kernel:  p_delete_rb_ed_pids+0x8f/0xb0 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_exploit_detection_exit+0x48/0x60 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_exploit_detection_init+0x339/0x3a0 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_lkrg_register+0x1b0/0x1000 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  ? 0xffffffffc0573000
>> Jun 04 16:58:17 morfikownia kernel:  do_one_initcall+0x5b/0x240
>> Jun 04 16:58:17 morfikownia kernel:  do_init_module+0x5f/0x230
>> Jun 04 16:58:17 morfikownia kernel:  load_module+0x26f7/0x29d0
>> Jun 04 16:58:17 morfikownia kernel:  ? __do_sys_finit_module+0xc2/0x120
>> Jun 04 16:58:17 morfikownia kernel:  __do_sys_finit_module+0xc2/0x120
>> Jun 04 16:58:17 morfikownia kernel:  do_syscall_64+0xa4/0x5e7
>> Jun 04 16:58:17 morfikownia kernel:  ? do_syscall_64+0x30/0x5e7
>> Jun 04 16:58:17 morfikownia kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
>> Jun 04 16:58:17 morfikownia kernel: RIP: 0033:0x7f040945ef79
>> Jun 04 16:58:17 morfikownia kernel: Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e7 3e 0c 00 f7 d8 64 89 01 48
>> Jun 04 16:58:17 morfikownia kernel: RSP: 002b:00007fff1eaee8e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
>> Jun 04 16:58:17 morfikownia kernel: RAX: ffffffffffffffda RBX: 00005e56a867eef0 RCX: 00007f040945ef79
>> Jun 04 16:58:17 morfikownia kernel: RDX: 0000000000000000 RSI: 00005e56a6eee358 RDI: 0000000000000003
>> Jun 04 16:58:17 morfikownia kernel: RBP: 0000000000040000 R08: 0000000000000000 R09: 00005e56a86803f0
>> Jun 04 16:58:17 morfikownia kernel: R10: 0000000000000003 R11: 0000000000000246 R12: 00005e56a6eee358
>> Jun 04 16:58:17 morfikownia kernel: R13: 0000000000000000 R14: 00005e56a867ee90 R15: 00005e56a867eef0
>> Jun 04 16:58:17 morfikownia kernel: INFO: Object 0x0000000002c6ed47 @offset=1088
>> Jun 04 16:58:17 morfikownia kernel: kmem_cache_destroy p_ed_pids: Slab cache still has objects
>> Jun 04 16:58:17 morfikownia kernel: CPU: 3 PID: 5515 Comm: modprobe Tainted: G    B      O    T 5.7.0-amd64 #4
>> Jun 04 16:58:17 morfikownia kernel: Hardware name: LENOVO 2349BM5/2349BM5, BIOS G1ETC2WW (2.82 ) 08/07/2019
>> Jun 04 16:58:17 morfikownia kernel: Call Trace:
>> Jun 04 16:58:17 morfikownia kernel:  dump_stack+0x50/0x68
>> Jun 04 16:58:17 morfikownia kernel:  kmem_cache_destroy.cold+0x15/0x1a
>> Jun 04 16:58:17 morfikownia kernel:  p_delete_rb_ed_pids+0x8f/0xb0 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_exploit_detection_exit+0x48/0x60 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_exploit_detection_init+0x339/0x3a0 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  p_lkrg_register+0x1b0/0x1000 [p_lkrg]
>> Jun 04 16:58:17 morfikownia kernel:  ? 0xffffffffc0573000
>> Jun 04 16:58:17 morfikownia kernel:  do_one_initcall+0x5b/0x240
>> Jun 04 16:58:17 morfikownia kernel:  do_init_module+0x5f/0x230
>> Jun 04 16:58:17 morfikownia kernel:  load_module+0x26f7/0x29d0
>> Jun 04 16:58:17 morfikownia kernel:  ? __do_sys_finit_module+0xc2/0x120
>> Jun 04 16:58:17 morfikownia kernel:  __do_sys_finit_module+0xc2/0x120
>> Jun 04 16:58:17 morfikownia kernel:  do_syscall_64+0xa4/0x5e7
>> Jun 04 16:58:17 morfikownia kernel:  ? do_syscall_64+0x30/0x5e7
>> Jun 04 16:58:17 morfikownia kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
>> Jun 04 16:58:17 morfikownia kernel: RIP: 0033:0x7f040945ef79
>> Jun 04 16:58:17 morfikownia kernel: Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e7 3e 0c 00 f7 d8 64 89 01 48
>> Jun 04 16:58:17 morfikownia kernel: RSP: 002b:00007fff1eaee8e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
>> Jun 04 16:58:17 morfikownia kernel: RAX: ffffffffffffffda RBX: 00005e56a867eef0 RCX: 00007f040945ef79
>> Jun 04 16:58:17 morfikownia kernel: RDX: 0000000000000000 RSI: 00005e56a6eee358 RDI: 0000000000000003
>> Jun 04 16:58:17 morfikownia kernel: RBP: 0000000000040000 R08: 0000000000000000 R09: 00005e56a86803f0
>> Jun 04 16:58:17 morfikownia kernel: R10: 0000000000000003 R11: 0000000000000246 R12: 00005e56a6eee358
>> Jun 04 16:58:17 morfikownia kernel: R13: 0000000000000000 R14: 00005e56a867ee90 R15: 00005e56a867eef0
>> Jun 04 16:58:17 morfikownia kernel: [p_lkrg] Can't initialize exploit detection features! Exiting...
>> Jun 04 16:58:17 morfikownia kernel: OOM killer enabled.
>> Jun 04 16:58:17 morfikownia kernel: Restarting tasks ... done.
>>
>>
>>
>
>

Content of type "text/html" skipped

Download attachment "signature.asc" of type "application/pgp-signature" (229 bytes)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.