Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 614868 - sys-kernel/hardened-sources-4.9.20: kernel BUG at arch/x86/mm/uderef_64.c:33! invalid opcode: 0000 [#1] SMP
Summary: sys-kernel/hardened-sources-4.9.20: kernel BUG at arch/x86/mm/uderef_64.c:33!...
Status: RESOLVED OBSOLETE
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Hardened (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: The Gentoo Linux Hardened Team
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-04-06 18:05 UTC by Dmitriy Baranov
Modified: 2018-10-11 23:35 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Dmitriy Baranov 2017-04-06 18:05:00 UTC
[37149.562705] PAX: execution attempt in: (null), 00000000-00000000 00000000
[37149.562709] PAX: terminating task: /usr/lib64/qt5/bin/qmlscene(qmlscene):9554, uid/euid: 1000/1000, PC: ffffffffffffff90, SP: 000003a91a8230c8
[37149.562710] PAX: bytes at PC: 
[37149.562717] ------------[ cut here ]------------
[37149.562739] kernel BUG at arch/x86/mm/uderef_64.c:33!
[37149.562754] invalid opcode: 0000 [#1] SMP
[37149.562765] Modules linked in: binfmt_misc coretemp i2c_i801 i2c_smbus snd_hda_codec_realtek snd_hda_codec_generic snd_hda_intel snd_hda_codec snd_hda_core snd_pcm thermal fan battery acpi_cpufreq processor efivarfs dm_zero dm_round_robin dm_multipath dm_raid dm_snapshot dm_bufio dm_crypt dm_mirror dm_region_hash dm_log dm_mod
[37149.562888] CPU: 1 PID: 9554 Comm: qmlscene Not tainted 4.9.20-hardened #1
[37149.562909] Hardware name: ASUS All Series/Z97-PRO, BIOS 2702 10/27/2015
[37149.562928] task: ffff88040f5bc140 task.stack: ffffc9000a340000
[37149.562945] RIP: 0010:[<ffffffff810d07c0>]  [<ffffffff810d07c0>] __pax_close_userland+0x4a/0xb2
[37149.562976] RSP: 0000:ffffc9000a343c10  EFLAGS: 00010296
[37149.562992] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000001
[37149.563013] RDX: ffffffffffffffff RSI: 0000000000000247 RDI: ffffffff82ccf148
[37149.563033] RBP: ffffc9000a343c28 R08: fffffff966b61aac R09: ffffc9000a343be8
[37149.563054] R10: ffffc9000a343c90 R11: 00000000000000a4 R12: ffffc9000a343ec8
[37149.563075] R13: 000003a91a8230c8 R14: ffffffffffffff90 R15: ffff88038c8f7000
[37149.563097] FS:  0000039e2233d740(0000) GS:ffff88043fa80000(0000) knlGS:0000000000000000
[37149.563120] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[37149.563137] CR2: ffffffffffffff90 CR3: 0000000003610000 CR4: 00000000001606f0
[37149.563157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[37149.563177] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[37149.563198] Stack:
[37149.563204]  fffffffffffffff2 0000000000000000 0000000000000001 ffffc9000a343c38
[37149.563229]  ffffffff81690741 ffffc9000a343c70 ffffffff810c4ebb 0000000000000000
[37149.563254]  ffff88040f5bc140 ffffffffffffff90 0000000000000000 ffff880297326c00
[37149.563279] Call Trace:
[37149.563288]  [<ffffffff81690741>] bad_get_user+0x1e/0x2e
[37149.563305]  [<ffffffff810c4ebb>] pax_report_insns+0x4b/0x1e0
[37149.563324]  [<ffffffff812e9fec>] pax_report_fault+0x3a5/0x41f
[37149.563342]  [<ffffffff810c412f>] __bad_area_nosemaphore+0x5e9/0x5fb
[37149.563362]  [<ffffffff810c4193>] bad_area_nosemaphore+0x52/0x72
[37149.563380]  [<ffffffff810c476f>] __do_page_fault+0x1be/0x7a1
[37149.563397]  [<ffffffff810c4e25>] do_page_fault+0x75/0xc0
[37149.563414]  [<ffffffff810c4e25>] ? do_page_fault+0x75/0xc0
[37149.563432]  [<ffffffff81fe949c>] page_fault+0x3c/0x50
[37149.563447] Code: cc cc cc 48 b8 00 f0 ff ff ff 03 00 00 48 39 82 08 05 00 00 75 50 65 8b 05 6e 98 f3 7e 0f 20 da 81 e2 ff 0f 00 00 48 ff ca 74 02 <0f> 0b 89 c0 b9 00 00 00 80 48 ba 00 00 00 80 ff 77 00 00 48 c1 
[37149.563570] RIP  [<ffffffff810d07c0>] __pax_close_userland+0x4a/0xb2
[37149.563590]  RSP <ffffc9000a343c10>
[37149.566668] ---[ end trace 161938c83c942b39 ]---
[37149.566670] grsec: banning user with uid 1000 until system restart for suspicious kernel crash