|
Message-ID: <cedb1aec-b60e-652b-87f9-7d165a546409@gmail.com> Date: Thu, 4 Jun 2020 21:04:11 +0200 From: Jacek <wampir990@...il.com> To: lkrg-users@...ts.openwall.com Subject: Re: Re: Support for 5.7 linux kernel? Hi I compiled LKRG with the latest commit. LKRG version: filename: /lib/modules/5.7.0-g2/extra/p_lkrg.ko license: GPL v2 description: pi3's Linux kernel Runtime Guard author: Adam 'pi3' Zabrocki (http://pi3.com.pl) srcversion: A71A9D244825DC212087199 depends: retpoline: Y name: p_lkrg vermagic: 5.7.0-g2 SMP preempt mod_unload modversions RANDSTRUCT_PLUGIN_ef6c602da94c0b38ee3353aa970b02005c9506ccfd022b488b7fcd548de3c84c modprobe says: # G1 Gentuś ### czw cze 04 20:48:11 domek : /ssdtmp/lkrg-main # root ~> modprobe -v p_lkrg insmod /lib/modules/5.7.0-g2/extra/p_lkrg.ko [ 188.472797] [p_lkrg] Loading LKRG... [ 197.737401] [p_lkrg] Can't initialize exploit detection features! Exiting... modprobe: ERROR: could not insert 'p_lkrg': No buffer space available dmesg says: [ 188.472797] [p_lkrg] Loading LKRG... [ 188.474574] BUG: using smp_processor_id() in preemptible [00000000] code: modprobe/9545 [ 188.474581] caller is p_parse_module_params+0x15c/0x287 [p_lkrg] [ 188.474582] CPU: 1 PID: 9545 Comm: modprobe Tainted: G C O T 5.7.0-g2 #3 [ 188.474582] Hardware name: Gigabyte Technology Co., Ltd. Z97-D3H/Z97-D3H-CF, BIOS F9 09/18/2015 [ 188.474583] Call Trace: [ 188.474587] dump_stack+0x50/0x68 [ 188.474589] debug_smp_processor_id.cold+0x4d/0x52 [ 188.474594] p_parse_module_params+0x15c/0x287 [p_lkrg] [ 188.474599] p_lkrg_register+0x4b/0x1000 [p_lkrg] [ 188.474600] ? 0xffffffffc0331000 [ 188.474602] do_one_initcall+0x56/0x230 [ 188.474605] do_init_module+0x59/0x210 [ 188.474607] load_module+0x2378/0x2700 [ 188.474610] ? __do_sys_finit_module+0xd7/0xf0 [ 188.474611] __do_sys_finit_module+0xd7/0xf0 [ 188.474613] do_syscall_64+0x94/0x220 [ 188.474615] ? do_syscall_64+0x27/0x220 [ 188.474618] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.474619] RIP: 0033:0x7fdb7e4aa509 [ 188.474620] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 57 09 0c 00 f7 d8 64 89 01 48 [ 188.474621] RSP: 002b:00007ffd5a503d08 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 188.474622] RAX: ffffffffffffffda RBX: 000055f39e425b20 RCX: 00007fdb7e4aa509 [ 188.474622] RDX: 0000000000000000 RSI: 000055f39d2e0390 RDI: 0000000000000003 [ 188.474623] RBP: 0000000000040000 R08: 0000000000000000 R09: 000055f39e427840 [ 188.474623] R10: 0000000000000003 R11: 0000000000000246 R12: 000055f39d2e0390 [ 188.474624] R13: 0000000000000000 R14: 000055f39e425c50 R15: 0000000000000000 [ 188.474625] BUG: using smp_processor_id() in preemptible [00000000] code: modprobe/9545 [ 188.474630] caller is p_parse_module_params+0x1af/0x287 [p_lkrg] [ 188.474630] CPU: 1 PID: 9545 Comm: modprobe Tainted: G C O T 5.7.0-g2 #3 [ 188.474631] Hardware name: Gigabyte Technology Co., Ltd. Z97-D3H/Z97-D3H-CF, BIOS F9 09/18/2015 [ 188.474631] Call Trace: [ 188.474632] dump_stack+0x50/0x68 [ 188.474633] debug_smp_processor_id.cold+0x4d/0x52 [ 188.474638] p_parse_module_params+0x1af/0x287 [p_lkrg] [ 188.474642] p_lkrg_register+0x4b/0x1000 [p_lkrg] [ 188.474642] ? 0xffffffffc0331000 [ 188.474643] do_one_initcall+0x56/0x230 [ 188.474645] do_init_module+0x59/0x210 [ 188.474646] load_module+0x2378/0x2700 [ 188.474649] ? __do_sys_finit_module+0xd7/0xf0 [ 188.474650] __do_sys_finit_module+0xd7/0xf0 [ 188.474652] do_syscall_64+0x94/0x220 [ 188.474654] ? do_syscall_64+0x27/0x220 [ 188.474655] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 188.474656] RIP: 0033:0x7fdb7e4aa509 [ 188.474656] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 57 09 0c 00 f7 d8 64 89 01 48 [ 188.474657] RSP: 002b:00007ffd5a503d08 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 188.474658] RAX: ffffffffffffffda RBX: 000055f39e425b20 RCX: 00007fdb7e4aa509 [ 188.474658] RDX: 0000000000000000 RSI: 000055f39d2e0390 RDI: 0000000000000003 [ 188.474659] RBP: 0000000000040000 R08: 0000000000000000 R09: 000055f39e427840 [ 188.474659] R10: 0000000000000003 R11: 0000000000000246 R12: 000055f39d2e0390 [ 188.474659] R13: 0000000000000000 R14: 000055f39e425c50 R15: 0000000000000000 [ 188.474661] [p_lkrg] System does NOT support SMAP. LKRG can't enforce SMAP validation :( [ 188.486717] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 188.488347] OOM killer disabled. [ 188.488372] [p_lkrg] 4/23 UMH paths were whitelisted... [ 192.099076] [p_lkrg] [kretprobe] register_kretprobe() for <ttwu_do_wakeup> failed! [err=-22] [ 192.099077] [p_lkrg] ERROR: Can't hook ttwu_do_wakeup :( [ 197.737401] [p_lkrg] Can't initialize exploit detection features! Exiting... [ 197.770252] OOM killer enabled. [ 197.770253] Restarting tasks ... done. W dniu 04.06.2020 o 19:42, Adam Zabrocki pisze: > Hi, > > I've just pushed a basic verification if necessary CONFIG_* options are > enabled. If I miss something in the latest commit, I will be incrementaly > adding them. > > Please try to recompile the module and check if it works. > > Thanks, > Adam > > On Thu, Jun 04, 2020 at 05:05:51PM +0200, Mikhail Morfikov wrote: >> On 04/06/2020 15:54, Jacek wrote: >> ... >> >> I also have something similar/the same now when I'm loading the lkrg module: >> >> >> >> Jun 04 16:58:17 morfikownia kernel: p_lkrg: loading out-of-tree module taints kernel. >> Jun 04 16:58:17 morfikownia kernel: [p_lkrg] Loading LKRG... >> Jun 04 16:58:17 morfikownia kernel: [p_lkrg] System does NOT support SMAP. LKRG can't enforce SMAP validation :( >> Jun 04 16:58:17 morfikownia kernel: Freezing user space processes ... (elapsed 0.016 seconds) done. >> Jun 04 16:58:17 morfikownia kernel: OOM killer disabled. >> Jun 04 16:58:17 morfikownia kernel: [p_lkrg] 8/23 UMH paths were whitelisted... >> Jun 04 16:58:17 morfikownia kernel: [p_lkrg] [kretprobe] register_kretprobe() for <ttwu_do_wakeup> failed! [err=-22] >> Jun 04 16:58:17 morfikownia kernel: [p_lkrg] ERROR: Can't hook ttwu_do_wakeup :( >> Jun 04 16:58:17 morfikownia kernel: ============================================================================= >> Jun 04 16:58:17 morfikownia kernel: BUG p_ed_pids (Tainted: G O T): Objects remaining in p_ed_pids on __kmem_cache_shutdown() >> Jun 04 16:58:17 morfikownia kernel: ----------------------------------------------------------------------------- >> Jun 04 16:58:17 morfikownia kernel: Disabling lock debugging due to kernel taint >> Jun 04 16:58:17 morfikownia kernel: INFO: Slab 0x00000000f876039f objects=32 used=1 fp=0x00000000cab2f402 flags=0x2ffe00000010200 >> Jun 04 16:58:17 morfikownia kernel: CPU: 3 PID: 5515 Comm: modprobe Tainted: G B O T 5.7.0-amd64 #4 >> Jun 04 16:58:17 morfikownia kernel: Hardware name: LENOVO 2349BM5/2349BM5, BIOS G1ETC2WW (2.82 ) 08/07/2019 >> Jun 04 16:58:17 morfikownia kernel: Call Trace: >> Jun 04 16:58:17 morfikownia kernel: dump_stack+0x50/0x68 >> Jun 04 16:58:17 morfikownia kernel: slab_err+0xdc/0x103 >> Jun 04 16:58:17 morfikownia kernel: ? slub_cpu_dead+0xa0/0xa0 >> Jun 04 16:58:17 morfikownia kernel: __kmem_cache_shutdown.cold+0x31/0x13a >> Jun 04 16:58:17 morfikownia kernel: shutdown_cache+0x16/0x1b0 >> Jun 04 16:58:17 morfikownia kernel: kmem_cache_destroy+0x229/0x250 >> Jun 04 16:58:17 morfikownia kernel: p_delete_rb_ed_pids+0x8f/0xb0 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_exploit_detection_exit+0x48/0x60 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_exploit_detection_init+0x339/0x3a0 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_lkrg_register+0x1b0/0x1000 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: ? 0xffffffffc0573000 >> Jun 04 16:58:17 morfikownia kernel: do_one_initcall+0x5b/0x240 >> Jun 04 16:58:17 morfikownia kernel: do_init_module+0x5f/0x230 >> Jun 04 16:58:17 morfikownia kernel: load_module+0x26f7/0x29d0 >> Jun 04 16:58:17 morfikownia kernel: ? __do_sys_finit_module+0xc2/0x120 >> Jun 04 16:58:17 morfikownia kernel: __do_sys_finit_module+0xc2/0x120 >> Jun 04 16:58:17 morfikownia kernel: do_syscall_64+0xa4/0x5e7 >> Jun 04 16:58:17 morfikownia kernel: ? do_syscall_64+0x30/0x5e7 >> Jun 04 16:58:17 morfikownia kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9 >> Jun 04 16:58:17 morfikownia kernel: RIP: 0033:0x7f040945ef79 >> Jun 04 16:58:17 morfikownia kernel: Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e7 3e 0c 00 f7 d8 64 89 01 48 >> Jun 04 16:58:17 morfikownia kernel: RSP: 002b:00007fff1eaee8e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 >> Jun 04 16:58:17 morfikownia kernel: RAX: ffffffffffffffda RBX: 00005e56a867eef0 RCX: 00007f040945ef79 >> Jun 04 16:58:17 morfikownia kernel: RDX: 0000000000000000 RSI: 00005e56a6eee358 RDI: 0000000000000003 >> Jun 04 16:58:17 morfikownia kernel: RBP: 0000000000040000 R08: 0000000000000000 R09: 00005e56a86803f0 >> Jun 04 16:58:17 morfikownia kernel: R10: 0000000000000003 R11: 0000000000000246 R12: 00005e56a6eee358 >> Jun 04 16:58:17 morfikownia kernel: R13: 0000000000000000 R14: 00005e56a867ee90 R15: 00005e56a867eef0 >> Jun 04 16:58:17 morfikownia kernel: INFO: Object 0x000000001f233985 @offset=576 >> Jun 04 16:58:17 morfikownia kernel: ============================================================================= >> Jun 04 16:58:17 morfikownia kernel: BUG p_ed_pids (Tainted: G B O T): Objects remaining in p_ed_pids on __kmem_cache_shutdown() >> Jun 04 16:58:17 morfikownia kernel: ----------------------------------------------------------------------------- >> Jun 04 16:58:17 morfikownia kernel: INFO: Slab 0x00000000b0d6792b objects=32 used=1 fp=0x00000000592cd8d9 flags=0x2ffe00000010200 >> Jun 04 16:58:17 morfikownia kernel: CPU: 3 PID: 5515 Comm: modprobe Tainted: G B O T 5.7.0-amd64 #4 >> Jun 04 16:58:17 morfikownia kernel: Hardware name: LENOVO 2349BM5/2349BM5, BIOS G1ETC2WW (2.82 ) 08/07/2019 >> Jun 04 16:58:17 morfikownia kernel: Call Trace: >> Jun 04 16:58:17 morfikownia kernel: dump_stack+0x50/0x68 >> Jun 04 16:58:17 morfikownia kernel: slab_err+0xdc/0x103 >> Jun 04 16:58:17 morfikownia kernel: __kmem_cache_shutdown.cold+0x31/0x13a >> Jun 04 16:58:17 morfikownia kernel: shutdown_cache+0x16/0x1b0 >> Jun 04 16:58:17 morfikownia kernel: kmem_cache_destroy+0x229/0x250 >> Jun 04 16:58:17 morfikownia kernel: p_delete_rb_ed_pids+0x8f/0xb0 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_exploit_detection_exit+0x48/0x60 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_exploit_detection_init+0x339/0x3a0 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_lkrg_register+0x1b0/0x1000 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: ? 0xffffffffc0573000 >> Jun 04 16:58:17 morfikownia kernel: do_one_initcall+0x5b/0x240 >> Jun 04 16:58:17 morfikownia kernel: do_init_module+0x5f/0x230 >> Jun 04 16:58:17 morfikownia kernel: load_module+0x26f7/0x29d0 >> Jun 04 16:58:17 morfikownia kernel: ? __do_sys_finit_module+0xc2/0x120 >> Jun 04 16:58:17 morfikownia kernel: __do_sys_finit_module+0xc2/0x120 >> Jun 04 16:58:17 morfikownia kernel: do_syscall_64+0xa4/0x5e7 >> Jun 04 16:58:17 morfikownia kernel: ? do_syscall_64+0x30/0x5e7 >> Jun 04 16:58:17 morfikownia kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9 >> Jun 04 16:58:17 morfikownia kernel: RIP: 0033:0x7f040945ef79 >> Jun 04 16:58:17 morfikownia kernel: Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e7 3e 0c 00 f7 d8 64 89 01 48 >> Jun 04 16:58:17 morfikownia kernel: RSP: 002b:00007fff1eaee8e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 >> Jun 04 16:58:17 morfikownia kernel: RAX: ffffffffffffffda RBX: 00005e56a867eef0 RCX: 00007f040945ef79 >> Jun 04 16:58:17 morfikownia kernel: RDX: 0000000000000000 RSI: 00005e56a6eee358 RDI: 0000000000000003 >> Jun 04 16:58:17 morfikownia kernel: RBP: 0000000000040000 R08: 0000000000000000 R09: 00005e56a86803f0 >> Jun 04 16:58:17 morfikownia kernel: R10: 0000000000000003 R11: 0000000000000246 R12: 00005e56a6eee358 >> Jun 04 16:58:17 morfikownia kernel: R13: 0000000000000000 R14: 00005e56a867ee90 R15: 00005e56a867eef0 >> Jun 04 16:58:17 morfikownia kernel: INFO: Object 0x00000000f48c566e @offset=8256 >> Jun 04 16:58:17 morfikownia kernel: ============================================================================= >> Jun 04 16:58:17 morfikownia kernel: BUG p_ed_pids (Tainted: G B O T): Objects remaining in p_ed_pids on __kmem_cache_shutdown() >> Jun 04 16:58:17 morfikownia kernel: ----------------------------------------------------------------------------- >> Jun 04 16:58:17 morfikownia kernel: INFO: Slab 0x00000000bf9211db objects=32 used=1 fp=0x00000000f8602c03 flags=0x2ffe00000010200 >> Jun 04 16:58:17 morfikownia kernel: CPU: 3 PID: 5515 Comm: modprobe Tainted: G B O T 5.7.0-amd64 #4 >> Jun 04 16:58:17 morfikownia kernel: Hardware name: LENOVO 2349BM5/2349BM5, BIOS G1ETC2WW (2.82 ) 08/07/2019 >> Jun 04 16:58:17 morfikownia kernel: Call Trace: >> Jun 04 16:58:17 morfikownia kernel: dump_stack+0x50/0x68 >> Jun 04 16:58:17 morfikownia kernel: slab_err+0xdc/0x103 >> Jun 04 16:58:17 morfikownia kernel: __kmem_cache_shutdown.cold+0x31/0x13a >> Jun 04 16:58:17 morfikownia kernel: shutdown_cache+0x16/0x1b0 >> Jun 04 16:58:17 morfikownia kernel: kmem_cache_destroy+0x229/0x250 >> Jun 04 16:58:17 morfikownia kernel: p_delete_rb_ed_pids+0x8f/0xb0 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_exploit_detection_exit+0x48/0x60 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_exploit_detection_init+0x339/0x3a0 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_lkrg_register+0x1b0/0x1000 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: ? 0xffffffffc0573000 >> Jun 04 16:58:17 morfikownia kernel: do_one_initcall+0x5b/0x240 >> Jun 04 16:58:17 morfikownia kernel: do_init_module+0x5f/0x230 >> Jun 04 16:58:17 morfikownia kernel: load_module+0x26f7/0x29d0 >> Jun 04 16:58:17 morfikownia kernel: ? __do_sys_finit_module+0xc2/0x120 >> Jun 04 16:58:17 morfikownia kernel: __do_sys_finit_module+0xc2/0x120 >> Jun 04 16:58:17 morfikownia kernel: do_syscall_64+0xa4/0x5e7 >> Jun 04 16:58:17 morfikownia kernel: ? do_syscall_64+0x30/0x5e7 >> Jun 04 16:58:17 morfikownia kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9 >> Jun 04 16:58:17 morfikownia kernel: RIP: 0033:0x7f040945ef79 >> Jun 04 16:58:17 morfikownia kernel: Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e7 3e 0c 00 f7 d8 64 89 01 48 >> Jun 04 16:58:17 morfikownia kernel: RSP: 002b:00007fff1eaee8e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 >> Jun 04 16:58:17 morfikownia kernel: RAX: ffffffffffffffda RBX: 00005e56a867eef0 RCX: 00007f040945ef79 >> Jun 04 16:58:17 morfikownia kernel: RDX: 0000000000000000 RSI: 00005e56a6eee358 RDI: 0000000000000003 >> Jun 04 16:58:17 morfikownia kernel: RBP: 0000000000040000 R08: 0000000000000000 R09: 00005e56a86803f0 >> Jun 04 16:58:17 morfikownia kernel: R10: 0000000000000003 R11: 0000000000000246 R12: 00005e56a6eee358 >> Jun 04 16:58:17 morfikownia kernel: R13: 0000000000000000 R14: 00005e56a867ee90 R15: 00005e56a867eef0 >> Jun 04 16:58:17 morfikownia kernel: INFO: Object 0x0000000024be6f4e @offset=5184 >> Jun 04 16:58:17 morfikownia kernel: ============================================================================= >> Jun 04 16:58:17 morfikownia kernel: BUG p_ed_pids (Tainted: G B O T): Objects remaining in p_ed_pids on __kmem_cache_shutdown() >> Jun 04 16:58:17 morfikownia kernel: ----------------------------------------------------------------------------- >> Jun 04 16:58:17 morfikownia kernel: INFO: Slab 0x0000000070a58fc0 objects=32 used=1 fp=0x00000000c1d6cdd8 flags=0x2ffe00000010200 >> Jun 04 16:58:17 morfikownia kernel: CPU: 3 PID: 5515 Comm: modprobe Tainted: G B O T 5.7.0-amd64 #4 >> Jun 04 16:58:17 morfikownia kernel: Hardware name: LENOVO 2349BM5/2349BM5, BIOS G1ETC2WW (2.82 ) 08/07/2019 >> Jun 04 16:58:17 morfikownia kernel: Call Trace: >> Jun 04 16:58:17 morfikownia kernel: dump_stack+0x50/0x68 >> Jun 04 16:58:17 morfikownia kernel: slab_err+0xdc/0x103 >> Jun 04 16:58:17 morfikownia kernel: __kmem_cache_shutdown.cold+0x31/0x13a >> Jun 04 16:58:17 morfikownia kernel: shutdown_cache+0x16/0x1b0 >> Jun 04 16:58:17 morfikownia kernel: kmem_cache_destroy+0x229/0x250 >> Jun 04 16:58:17 morfikownia kernel: p_delete_rb_ed_pids+0x8f/0xb0 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_exploit_detection_exit+0x48/0x60 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_exploit_detection_init+0x339/0x3a0 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_lkrg_register+0x1b0/0x1000 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: ? 0xffffffffc0573000 >> Jun 04 16:58:17 morfikownia kernel: do_one_initcall+0x5b/0x240 >> Jun 04 16:58:17 morfikownia kernel: do_init_module+0x5f/0x230 >> Jun 04 16:58:17 morfikownia kernel: load_module+0x26f7/0x29d0 >> Jun 04 16:58:17 morfikownia kernel: ? __do_sys_finit_module+0xc2/0x120 >> Jun 04 16:58:17 morfikownia kernel: __do_sys_finit_module+0xc2/0x120 >> Jun 04 16:58:17 morfikownia kernel: do_syscall_64+0xa4/0x5e7 >> Jun 04 16:58:17 morfikownia kernel: ? do_syscall_64+0x30/0x5e7 >> Jun 04 16:58:17 morfikownia kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9 >> Jun 04 16:58:17 morfikownia kernel: RIP: 0033:0x7f040945ef79 >> Jun 04 16:58:17 morfikownia kernel: Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e7 3e 0c 00 f7 d8 64 89 01 48 >> Jun 04 16:58:17 morfikownia kernel: RSP: 002b:00007fff1eaee8e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 >> Jun 04 16:58:17 morfikownia kernel: RAX: ffffffffffffffda RBX: 00005e56a867eef0 RCX: 00007f040945ef79 >> Jun 04 16:58:17 morfikownia kernel: RDX: 0000000000000000 RSI: 00005e56a6eee358 RDI: 0000000000000003 >> Jun 04 16:58:17 morfikownia kernel: RBP: 0000000000040000 R08: 0000000000000000 R09: 00005e56a86803f0 >> Jun 04 16:58:17 morfikownia kernel: R10: 0000000000000003 R11: 0000000000000246 R12: 00005e56a6eee358 >> Jun 04 16:58:17 morfikownia kernel: R13: 0000000000000000 R14: 00005e56a867ee90 R15: 00005e56a867eef0 >> Jun 04 16:58:17 morfikownia kernel: INFO: Object 0x0000000002c6ed47 @offset=1088 >> Jun 04 16:58:17 morfikownia kernel: kmem_cache_destroy p_ed_pids: Slab cache still has objects >> Jun 04 16:58:17 morfikownia kernel: CPU: 3 PID: 5515 Comm: modprobe Tainted: G B O T 5.7.0-amd64 #4 >> Jun 04 16:58:17 morfikownia kernel: Hardware name: LENOVO 2349BM5/2349BM5, BIOS G1ETC2WW (2.82 ) 08/07/2019 >> Jun 04 16:58:17 morfikownia kernel: Call Trace: >> Jun 04 16:58:17 morfikownia kernel: dump_stack+0x50/0x68 >> Jun 04 16:58:17 morfikownia kernel: kmem_cache_destroy.cold+0x15/0x1a >> Jun 04 16:58:17 morfikownia kernel: p_delete_rb_ed_pids+0x8f/0xb0 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_exploit_detection_exit+0x48/0x60 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_exploit_detection_init+0x339/0x3a0 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: p_lkrg_register+0x1b0/0x1000 [p_lkrg] >> Jun 04 16:58:17 morfikownia kernel: ? 0xffffffffc0573000 >> Jun 04 16:58:17 morfikownia kernel: do_one_initcall+0x5b/0x240 >> Jun 04 16:58:17 morfikownia kernel: do_init_module+0x5f/0x230 >> Jun 04 16:58:17 morfikownia kernel: load_module+0x26f7/0x29d0 >> Jun 04 16:58:17 morfikownia kernel: ? __do_sys_finit_module+0xc2/0x120 >> Jun 04 16:58:17 morfikownia kernel: __do_sys_finit_module+0xc2/0x120 >> Jun 04 16:58:17 morfikownia kernel: do_syscall_64+0xa4/0x5e7 >> Jun 04 16:58:17 morfikownia kernel: ? do_syscall_64+0x30/0x5e7 >> Jun 04 16:58:17 morfikownia kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9 >> Jun 04 16:58:17 morfikownia kernel: RIP: 0033:0x7f040945ef79 >> Jun 04 16:58:17 morfikownia kernel: Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e7 3e 0c 00 f7 d8 64 89 01 48 >> Jun 04 16:58:17 morfikownia kernel: RSP: 002b:00007fff1eaee8e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 >> Jun 04 16:58:17 morfikownia kernel: RAX: ffffffffffffffda RBX: 00005e56a867eef0 RCX: 00007f040945ef79 >> Jun 04 16:58:17 morfikownia kernel: RDX: 0000000000000000 RSI: 00005e56a6eee358 RDI: 0000000000000003 >> Jun 04 16:58:17 morfikownia kernel: RBP: 0000000000040000 R08: 0000000000000000 R09: 00005e56a86803f0 >> Jun 04 16:58:17 morfikownia kernel: R10: 0000000000000003 R11: 0000000000000246 R12: 00005e56a6eee358 >> Jun 04 16:58:17 morfikownia kernel: R13: 0000000000000000 R14: 00005e56a867ee90 R15: 00005e56a867eef0 >> Jun 04 16:58:17 morfikownia kernel: [p_lkrg] Can't initialize exploit detection features! Exiting... >> Jun 04 16:58:17 morfikownia kernel: OOM killer enabled. >> Jun 04 16:58:17 morfikownia kernel: Restarting tasks ... done. >> >> >> > > Content of type "text/html" skipped Download attachment "signature.asc" of type "application/pgp-signature" (229 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.