Re: net: netlink executing RO memory

2014-06-07 Thread Thomas Gleixner
On Sat, 7 Jun 2014, Thomas Gleixner wrote: > On Sat, 7 Jun 2014, Sasha Levin wrote: > So one thing which might give us at least some data is the debug patch > below. With CONFIG_STACKTRACE enabled and > > # echo 1 >/sys/kernel/debug/tracing/options/stacktrace > > we should get a recording of rcu

Re: net: netlink executing RO memory

2014-06-07 Thread Thomas Gleixner
On Sat, 7 Jun 2014, Sasha Levin wrote: > On 06/06/2014 01:45 AM, Sasha Levin wrote: > > On 06/05/2014 04:21 PM, Sasha Levin wrote: > >> Hi all, > >> > >> While fuzzing with trinity inside a KVM tools guest running the latest > >> -next > >> kernel I've stumbled on the following spew: > >> > >> [

Re: net: netlink executing RO memory

2014-06-07 Thread Sasha Levin
On 06/06/2014 01:45 AM, Sasha Levin wrote: > On 06/05/2014 04:21 PM, Sasha Levin wrote: >> Hi all, >> >> While fuzzing with trinity inside a KVM tools guest running the latest -next >> kernel I've stumbled on the following spew: >> >> [ 306.065161] kernel tried to execute NX-protected page - explo

Re: net: netlink executing RO memory

2014-06-05 Thread Sasha Levin
On 06/05/2014 04:21 PM, Sasha Levin wrote: > Hi all, > > While fuzzing with trinity inside a KVM tools guest running the latest -next > kernel I've stumbled on the following spew: > > [ 306.065161] kernel tried to execute NX-protected page - exploit attempt? > (uid: 0) > [ 306.067295] BUG: una

net: netlink executing RO memory

2014-06-05 Thread Sasha Levin
Hi all, While fuzzing with trinity inside a KVM tools guest running the latest -next kernel I've stumbled on the following spew: [ 306.065161] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) [ 306.067295] BUG: unable to handle kernel paging request at 880053b8fd08 [