Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sun, 19 Jul 2020 19:28:47 +0200
From: Mikhail Morfikov <mmorfikov@...il.com>
To: lkrg-users@...ts.openwall.com
Subject: kernel: BUG: unable to handle page fault for address:
 ffffffffab42fee7

I wanted to play with KVM, and it looks like that LKRG has some issues with it.
After typing the following command in a terminal:

# virsh net-start default

I got this:

kernel: virbr0: port 1(virbr0-nic) entered blocking state
kernel: virbr0: port 1(virbr0-nic) entered disabled state
kernel: device virbr0-nic entered promiscuous mode
kernel: [p_lkrg] Blocked usermodehelper execution of [/sbin/bridge-stp]
kernel: CPA  protect  Rodata RO: 0xffffffffab42f000 - 0xffffffffab42ffff PFN 216a2f req 8000000000000063 prevent 0000000000000002
kernel: CPA  protect  Rodata RO: 0xffff8f7dd6a2f000 - 0xffff8f7dd6a2ffff PFN 216a2f req 8000000000000063 prevent 0000000000000002
kernel: BUG: unable to handle page fault for address: ffffffffab42fee7
kernel: #PF: supervisor write access in kernel mode
kernel: #PF: error_code(0x0003) - permissions violation
kernel: PGD 216c0c067 P4D 216c0c067 PUD 216c0d063 PMD 20b750063 PTE 8000000216a2f061
kernel: Oops: 0003 [#1] PREEMPT SMP PTI
kernel: CPU: 2 PID: 9427 Comm: kworker/u16:5 Tainted: G           O    T 5.7.9-amd64 #18
kernel: Hardware name: LENOVO 2349BM5/2349BM5, BIOS G1ETC2WW (2.82 ) 08/07/2019
kernel: RIP: 0010:memset_erms+0x9/0x10
kernel: Code: c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 <f3> aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01
kernel: RSP: 0018:ffffab4743d83c48 EFLAGS: 00010202
kernel: RAX: 000000000000002f RBX: ffffffffab42f000 RCX: 0000000000000010
kernel: RDX: 0000000000000010 RSI: 000000000000002f RDI: ffffffffab42fee7
kernel: RBP: ffffffffab42fee7 R08: 000000000000046e R09: ffffffffab42fee7
kernel: R10: 0000000000000000 R11: 0000000000000001 R12: ffff8f7dc018ab00
kernel: R13: ffffd7a6482dd428 R14: ffffffffc024cd00 R15: 0000000000000000
kernel: FS:  0000000000000000(0000) GS:ffff8f7dde280000(0000) knlGS:0000000000000000
kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: ffffffffab42fee7 CR3: 00000001c04ba005 CR4: 00000000001606e0
kernel: Call Trace:
kernel:  p_call_usermodehelper_entry+0x352/0x390 [p_lkrg]
kernel:  pre_handler_kretprobe+0xaf/0x1b0
kernel:  ? call_usermodehelper_exec_work+0x160/0x160
kernel:  ? call_usermodehelper_exec_async+0x5/0x1a0
kernel:  kprobe_ftrace_handler+0xb8/0x120
kernel:  ? call_usermodehelper_exec_work+0x160/0x160
kernel:  ? ret_from_fork+0x35/0x40
kernel:  ftrace_ops_assist_func+0x8d/0xf0
kernel:  ? call_usermodehelper_exec_work+0x160/0x160
kernel:  0xffffffffc026b0c8
kernel:  ? call_usermodehelper_exec_work+0x160/0x160
kernel:  ? call_usermodehelper_exec_async+0x1/0x1a0
kernel:  call_usermodehelper_exec_async+0x5/0x1a0
kernel:  ret_from_fork+0x35/0x40
kernel: Modules linked in: p_lkrg(O)
kernel: CR2: ffffffffab42fee7
kernel: ---[] end trace 242c7d80035b6b9f ]---
kernel: RIP: 0010:memset_erms+0x9/0x10
kernel: Code: c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 <f3> aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01
kernel: RSP: 0018:ffffab4743d83c48 EFLAGS: 00010202
kernel: RAX: 000000000000002f RBX: ffffffffab42f000 RCX: 0000000000000010
kernel: RDX: 0000000000000010 RSI: 000000000000002f RDI: ffffffffab42fee7
kernel: RBP: ffffffffab42fee7 R08: 000000000000046e R09: ffffffffab42fee7
kernel: R10: 0000000000000000 R11: 0000000000000001 R12: ffff8f7dc018ab00
kernel: R13: ffffd7a6482dd428 R14: ffffffffc024cd00 R15: 0000000000000000
kernel: FS:  0000000000000000(0000) GS:ffff8f7dde280000(0000) knlGS:0000000000000000
kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: ffffffffab42fee7 CR3: 00000001c04ba005 CR4: 00000000001606e0
kernel: note: kworker/u16:5[9427] exited with preempt_count 2
kernel: virbr0: failed to start userspace STP (9)
kernel: device virbr0-nic left promiscuous mode
kernel: virbr0: port 1(virbr0-nic) entered disabled state

I had lkrg.msr_validate set to 1, but I changed it to 0 to check whether that 
helps, but it didn't -- this happens when the default LKRG sysctl options are 
used.

Also I don't have this /sbin/bridge-stp file, there's only:

# ls -al /sbin/bridge*
-rwxr-xr-x 1 root root 104760 2020-06-06 13:27:27 /sbin/bridge*

----------
# cat /proc/version
Linux version 5.7.9-amd64 (morfik@...fikownia) (gcc version 10.1.0 (Debian 10.1.0-6), GNU ld (GNU Binutils for Debian) 2.34.90.20200706) #18 SMP PREEMPT Sun Jul 19 09:44:39 CEST 2020



Download attachment "signature.asc" of type "application/pgp-signature" (229 bytes)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.