<div dir="ltr"><div>Thanks for the answer!</div><div><br></div><div>I set the clear interrupt flag from this article: <a href="http://vulnfactory.org/blog/2011/08/12/wp-safe-or-not/">http://vulnfactory.org/blog/2011/08/12/wp-safe-or-not/</a></div><div>As apparently if not done it could lead to a scheduling problem on SMP systems?</div><div><br></div><div>Thanks,</div><div>Enzo<br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, Apr 23, 2020 at 2:05 AM 양원혁 <<a href="mailto:kjhg4321@naver.com">kjhg4321@naver.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div><div style="font-size:10pt;font-family:Gulim,sans-serif"><p><span style="font-size:13.3333px">According to the log, the page frame of sys_call_table is not currently present.</span> </p><p style="font-size:13.3333px"><span style="font-size:13.3333px">So it should be handled by page fault handler.</span> </p><div><span style="font-size:13.3333px">But. disable_write_protection blocks the interrupt via the cli instruction. </span></div><div><span style="font-size:13.3333px">So the page fault handler cannot be performed.</span><br></div><p><span style="font-size:10pt"> </span></p><p><span style="font-size:10pt">> [ 4024.772066] Module loading</span> </p><div dir="ltr">> [ 4024.790716] + sys_call_table address = 00000000055df43d<br>> [ 4024.790718] Execve syscall # 59<br>> [ 4024.791116] BUG: unable to handle page fault for address: 000000008004020b<br>> [ 4024.792614] #PF: supervisor write access in kernel mode<br>> [ 4024.793944] #PF: error_code(0x0002) - not-present page<br><br></div>
</div></div><table style="display:none"><tbody><tr><td><img src="https://mail.naver.com/readReceipt/notify/?img=7PYqFz%2Bc14n%2FMqUYaquZFxkopAFoFxEdMxU9axJCFxE%2FFoJSMqMXMobraAkgMX%2B0MogwKSl5WLl5pNiC740ThoR0WNGTtz30br0CprE5WXiN.gif" border="0"></td></tr></tbody></table></blockquote></div>