VirtualBox

Ticket #11610: fedora-18-oops.txt

File fedora-18-oops.txt, 2.8 KB (added by Ronan SALMON, 11 years ago)

kernel oops starting a VM on a up-to-date fedora 18 Linux bureau 3.8.5-201.fc18.i686.PAE #1 SMP Thu Mar 28 21:50:08 UTC 2013 i686 i686 i386 GNU/Linux VirtualBox-4.2-4.2.10_84104_fedora18-1.i686

Line 
1[ 3792.320909] kernel tried to execute NX-protected page - exploit attempt? (uid: 1000)
2[ 3792.321002] BUG: unable to handle kernel paging request at f959a2a0
3[ 3792.321002] IP: [<f959a2a0>] 0xf959a29f
4[ 3792.321002] *pdpt = 0000000000d0e001 *pde = 00000000310ab067 *pte = 8000000178fd5163
5[ 3792.321002] Oops: 0011 [#1] SMP
6[ 3792.321002] Modules linked in: nfsv3 nfsv4 nfs dns_resolver fscache vboxpci(OF) vboxnetadp(OF) vboxnetflt(OF) vboxdrv(OF) fuse snd_hda_codec_analog snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm i915 snd_page_alloc snd_timer video coretemp snd i2c_algo_bit drm_kms_helper kvm_intel soundcore drm kvm ppdev i2c_i801 iTCO_wdt iTCO_vendor_support tg3 lpc_ich parport_pc ptp parport pps_core i2c_core mfd_core serio_raw dcdbas microcode nfsd auth_rpcgss nfs_acl lockd sunrpc
7[ 3792.321002] Pid: 1759, comm: EMT Tainted: GF C O 3.8.5-201.fc18.i686.PAE #1 Dell Inc. OptiPlex 745 /0HR330
8[ 3792.321002] EIP: 0060:[<f959a2a0>] EFLAGS: 00010286 CPU: 0
9[ 3792.321002] EIP is at 0xf959a2a0
10[ 3792.321002] EAX: ef5ba610 EBX: f10ec690 ECX: f959a2a0 EDX: f959b8b0
11[ 3792.321002] ESI: f842fb00 EDI: f9615010 EBP: eb467ed0 ESP: eb467e78
12[ 3792.321002] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
13[ 3792.321002] CR0: 80050033 CR2: f959a2a0 CR3: 32fee000 CR4: 000007f0
14[ 3792.321002] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
15[ 3792.353502] DR6: ffff0ff0 DR7: 00000400
16[ 3792.353502] Process EMT (pid: 1759, ti=eb466000 task=ef5ba610 task.ti=eb466000)
17[ 3792.353502] Stack:
18[ 3792.353502] f840621b f10ec690 f8424de8 f840e50c 00000000 000984b0 eb467ecc eb467eac
19[ 3792.353502] c053cb48 00000163 00002618 ffffffff f840e50c eb467ec4 f96a6d38 00000011
20[ 3792.353502] f959b5f0 f959b8b0 c06976e1 00005604 eb3543c0 acd9d008 eb467f18 f84013a7
21[ 3792.353502] Call Trace:
22[ 3792.353502] [<f840621b>] ? supdrvIOCtl+0x12db/0x2c10 [vboxdrv]
23[ 3792.353502] [<f840e50c>] ? rtR0MemAllocEx+0x2c/0xc0 [vboxdrv]
24[ 3792.353502] [<c053cb48>] ? vmalloc+0x38/0x40
25[ 3792.353502] [<f840e50c>] ? rtR0MemAllocEx+0x2c/0xc0 [vboxdrv]
26[ 3792.353502] [<c06976e1>] ? _copy_from_user+0x41/0x60
27[ 3792.353502] [<f84013a7>] VBoxDrvLinuxIOCtl_4_2_10+0xf7/0x1e0 [vboxdrv]
28[ 3792.353502] [<f84012b0>] ? SUPR0Printf+0x70/0x70 [vboxdrv]
29[ 3792.353502] [<c056983a>] do_vfs_ioctl+0x7a/0x590
30[ 3792.353502] [<c099d93f>] ? __do_page_fault+0x22f/0x490
31[ 3792.353502] [<c0569dbb>] sys_ioctl+0x6b/0x80
32[ 3792.353502] [<c09a15cd>] sysenter_do_call+0x12/0x28
33[ 3792.353502] Code: 89 ec 5d c3 8d b4 26 00 00 00 00 83 fa 07 74 e7 8b 5d f8 8b 75 fc 89 ec 5d e9 8d 18 05 00 8d b6 00 00 00 00 8d bc 27 00 00 00 00 <55> 89 e5 53 83 ec 24 8b 45 08 c7 44 24 04 20 00 61 f9 89 04 24
34[ 3792.353502] EIP: [<f959a2a0>] 0xf959a2a0 SS:ESP 0068:eb467e78
35[ 3792.353502] CR2: 00000000f959a2a0
36[ 3792.430387] ---[ end trace c7af6e951cbe4c99 ]---

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy