Hi Alex, while playing around with attaching a 32bit PCI device to a guest via VFIO I triggered this oops: [ 192.289917] kernel tried to execute NX-protected page - exploit attempt? (uid: 0) [ 192.298245] BUG: unable to handle kernel paging request at ffff880224582608 [ 192.306195] IP: [<ffff880224582608>] 0xffff880224582608 [ 192.312302] PGD 2026067 PUD 2029067 PMD 80000002244001e3 [ 192.318589] Oops: 0011 [#1] PREEMPT SMP [ 192.323363] Modules linked in: kvm_amd kvm vfio_pci vfio_iommu_type1 vfio_virqfd vfio bnep bluetooth rfkill iscsi_ibft iscsi_boot_sysfs af_packet snd_hda_codec_via snd_hda_codec_generic snd_hda_codec_hdmi raid1 snd_hda_intel crct10dif_pclmul crc32_pclmul snd_hda_codec crc32c_intel ghash_clmulni_intel snd_hwdep snd_hda_core snd_pcm snd_timer aesni_intel aes_x86_64 md_mod glue_helper lrw gf128mul ablk_helper be2net snd serio_raw cryptd sp5100_tco pcspkr xhci_pci vxlan ip6_udp_tunnel fam15h_power sky2 udp_tunnel xhci_hcd soundcore dm_mod k10temp i2c_piix4 shpchp wmi acpi_cpufreq asus_atk0110 button processor ata_generic firewire_ohci firewire_core ohci_pci crc_itu_t radeon i2c_algo_bit drm_kms_helper pata_jmicron syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm sg [last unloaded: kvm] [ 192.399986] CPU: 4 PID: 2037 Comm: qemu-system-x86 Not tainted 4.3.0-rc4+ #4 [ 192.408260] Hardware name: System manufacturer System Product Name/Crosshair IV Formula, BIOS 3027 10/28/2011 [ 192.419746] task: ffff880223e24040 ti: ffff8800cae5c000 task.ti: ffff8800cae5c000 [ 192.428506] RIP: 0010:[<ffff880224582608>] [<ffff880224582608>] 0xffff880224582608 [ 192.437376] RSP: 0018:ffff8800cae5fe58 EFLAGS: 00010286 [ 192.443940] RAX: ffff8800cb3c8800 RBX: ffff8800cba55800 RCX: 0000000000000004 [ 192.452370] RDX: 0000000000000004 RSI: ffff8802233e7887 RDI: 0000000000000001 [ 192.460796] RBP: ffff8800cae5fe98 R08: 0000000000000ff8 R09: 0000000000000008 [ 192.469145] R10: 000000000001d300 R11: 0000000000000000 R12: ffff8800cba55800 [ 192.477584] R13: ffff8802233e7880 R14: ffff8800cba55830 R15: 00007fff43b30b50 [ 192.486025] FS: 00007f94375b2c00(0000) GS:ffff88022ed00000(0000) knlGS:0000000000000000 [ 192.495445] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 192.502481] CR2: ffff880224582608 CR3: 00000000cb9d9000 CR4: 00000000000406e0 [ 192.510850] Stack: [ 192.514094] ffffffffa03f9733 0000000100000000 0000000000000001 ffff880223c74600 [ 192.522876] ffff8800ca4f6d88 00007fff43b30b50 0000000000003b6a 00007fff43b30b50 [ 192.531582] ffff8800cae5ff08 ffffffff811efc7d ffff8800cae5fec8 ffff880223c74600 [ 192.540439] Call Trace: [ 192.544145] [<ffffffffa03f9733>] ? vfio_group_fops_unl_ioctl+0x253/0x410 [vfio] [ 192.552898] [<ffffffff811efc7d>] do_vfs_ioctl+0x2cd/0x4c0 [ 192.559713] [<ffffffff811f9687>] ? __fget+0x77/0xb0 [ 192.565998] [<ffffffff811efee9>] SyS_ioctl+0x79/0x90 [ 192.572373] [<ffffffff81001bb0>] ? syscall_return_slowpath+0x50/0x130 [ 192.580258] [<ffffffff8167f776>] entry_SYSCALL_64_fastpath+0x16/0x75 [ 192.588049] Code: 88 ff ff d8 25 58 24 02 88 ff ff e8 25 58 24 02 88 ff ff e8 25 58 24 02 88 ff ff 58 a2 70 21 02 88 ff ff c0 65 39 cb 00 88 ff ff <08> 2d 58 24 02 88 ff ff 08 88 3c cb 00 88 ff ff d8 58 c1 24 02 [ 192.610309] RIP [<ffff880224582608>] 0xffff880224582608 [ 192.616940] RSP <ffff8800cae5fe58> [ 192.621805] CR2: ffff880224582608 [ 192.632826] ---[ end trace ce135ef0c9b1869f ]--- I am not sure whether this is an IOMMU or VFIO bug, have you seen something like this before? Joerg -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html