Metasploit-framework: Kernel Panic

Created on 11 Jul 2019  路  3Comments  路  Source: rapid7/metasploit-framework

Unable to handle kernel NULL pointer dereference at virtual address 0xd34db33f
EFLAGS: 00010046
eax: 00000001 ebx: f77c8c00 ecx: 00000000 edx: f77f0001
esi: 803bf014 edi: 8023c755 ebp: 80237f84 esp: 80237f60
ds: 0018 es: 0018 ss: 0018
Process Swapper (Pid: 0, process nr: 0, stackpage=80377000)

Stack: 90909090990909090990909090
90909090990909090990909090
90909090.90909090.90909090
90909090.90909090.90909090
90909090.90909090.09090900
90909090.90909090.09090900
..........................
cccccccccccccccccccccccccc
cccccccccccccccccccccccccc
ccccccccc.................
cccccccccccccccccccccccccc
cccccccccccccccccccccccccc
.................ccccccccc
cccccccccccccccccccccccccc
cccccccccccccccccccccccccc
..........................
ffffffffffffffffffffffffff
ffffffff..................
ffffffffffffffffffffffffff
ffffffff..................
ffffffff..................
ffffffff..................

Code: 00 00 00 00 M3 T4 SP L0 1T FR 4M 3W OR K! V3 R5 I0 N4 00 00 00 00
Aiee, Killing Interrupt handler
Kernel panic: Attempted to kill the idle task!
In swapper task - not syncing

   =[ metasploit v5.0.35-dev                          ]

  • -- --=[ 1905 exploits - 1073 auxiliary - 329 post ]
  • -- --=[ 545 payloads - 44 encoders - 10 nops ]
  • -- --=[ 2 evasion ]

msf5 >

Most helpful comment

Pay no attention to jmartin.

Are you able to reproduce the kernel panic ?

All 3 comments

How often does this happen? Does that happen every time you start msfconsole ?

Pay no attention to jmartin.

Are you able to reproduce the kernel panic ?

Was this page helpful?
0 / 5 - 0 ratings