kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle page fault for address: ffff8881e518bbd0 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0011) - permissions violation PGD 7801067 P4D 7801067 PUD 1e1ac6063 PMD 80000001e50001e3 Oops: 0011 [#1] PREEMPT SMP KASAN CPU: 1 PID: 835 Comm: syz.0.126 Not tainted 5.4.290-syzkaller-00017-g6b07fcd94a6a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 RIP: 0010:0xffff8881e518bbd0 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 90 b1 18 e5 81 88 ff ff e0 0c 26 85 ff ff ff ff <01> 00 00 00 00 00 00 00 40 5a 53 ea 81 88 ff ff 18 50 53 ea 81 88 RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010202 RAX: ffffffff8154e8ca RBX: 0000000000000101 RCX: ffff8881e0b78000 RDX: 0000000000000101 RSI: ffff8881e518bbd0 RDI: ffff8881e518b1c0 RBP: ffff8881f6f09ec8 R08: ffffffff8154e50e R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffff9820 R13: dffffc0000000000 R14: ffff8881e518bbd0 R15: ffff8881e518b1c0 FS: 00007f25238a16c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8881e518bbd0 CR3: 00000001d5ba2000 CR4: 00000000003406a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830 __do_softirq+0x23b/0x6b7 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x195/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:539 [inline] smp_apic_timer_interrupt+0x11a/0x490 arch/x86/kernel/apic/apic.c:1161 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834 RIP: 0010:__raw_spin_unlock_irq include/linux/spinlock_api_smp.h:169 [inline] RIP: 0010:_raw_spin_unlock_irq+0x45/0x60 kernel/locking/spinlock.c:199 Code: 08 00 74 0c 48 c7 c7 90 3c eb 85 e8 55 03 3d fd 48 83 3d ad 0a 94 01 00 74 29 48 89 df e8 a3 d5 f4 fc 66 90 fb bf 01 00 00 00 d6 bf ed fc 65 8b 05 8b 5b ab 7b 85 c0 74 02 5b c3 e8 14 22 a9 RSP: 0018:ffff8881c8587610 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000001 RBX: ffff8881d503d6b8 RCX: dffffc0000000000 RDX: ffffc90000d41000 RSI: 0000000000051a36 RDI: 0000000000000001 RBP: ffff8881c8587790 R08: ffffffff8231cd01 R09: fffff94000e7bce1 R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000001 R13: 1ffff110390b0ede R14: dffffc0000000000 R15: ffff8881c85876e0 spin_unlock_irq include/linux/spinlock.h:388 [inline] shmem_add_to_page_cache+0xa15/0xcb0 mm/shmem.c:652 shmem_getpage_gfp+0x118f/0x2440 mm/shmem.c:1890 shmem_getpage mm/shmem.c:154 [inline] shmem_write_begin+0xc9/0x1a0 mm/shmem.c:2447 generic_perform_write+0x2c7/0x560 mm/filemap.c:3450 __generic_file_write_iter+0x224/0x530 mm/filemap.c:3579 generic_file_write_iter+0x455/0x5f0 mm/filemap.c:3611 call_write_iter include/linux/fs.h:1991 [inline] new_sync_write fs/read_write.c:483 [inline] __vfs_write+0x5d3/0x750 fs/read_write.c:496 vfs_write+0x206/0x4e0 fs/read_write.c:558 ksys_write+0x199/0x2c0 fs/read_write.c:611 do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x5c/0xc1 RIP: 0033:0x7f2525237169 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f25238a1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007f252544ffa0 RCX: 00007f2525237169 RDX: 00000000fffffdef RSI: 0000400000000140 RDI: 0000000000000006 RBP: 00007f25252b82a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f252544ffa0 R15: 00007ffe00c04488 Modules linked in: CR2: ffff8881e518bbd0 ---[ end trace 12dcc3774356aad4 ]--- RIP: 0010:0xffff8881e518bbd0 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 90 b1 18 e5 81 88 ff ff e0 0c 26 85 ff ff ff ff <01> 00 00 00 00 00 00 00 40 5a 53 ea 81 88 ff ff 18 50 53 ea 81 88 RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010202 RAX: ffffffff8154e8ca RBX: 0000000000000101 RCX: ffff8881e0b78000 RDX: 0000000000000101 RSI: ffff8881e518bbd0 RDI: ffff8881e518b1c0 RBP: ffff8881f6f09ec8 R08: ffffffff8154e50e R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffff9820 R13: dffffc0000000000 R14: ffff8881e518bbd0 R15: ffff8881e518b1c0 FS: 00007f25238a16c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8881e518bbd0 CR3: 00000001d5ba2000 CR4: 00000000003406a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 08 00 or %al,(%rax) 2: 74 0c je 0x10 4: 48 c7 c7 90 3c eb 85 mov $0xffffffff85eb3c90,%rdi b: e8 55 03 3d fd call 0xfd3d0365 10: 48 83 3d ad 0a 94 01 cmpq $0x0,0x1940aad(%rip) # 0x1940ac5 17: 00 18: 74 29 je 0x43 1a: 48 89 df mov %rbx,%rdi 1d: e8 a3 d5 f4 fc call 0xfcf4d5c5 22: 66 90 xchg %ax,%ax 24: fb sti 25: bf 01 00 00 00 mov $0x1,%edi * 2a: e8 d6 bf ed fc call 0xfcedc005 <-- trapping instruction 2f: 65 8b 05 8b 5b ab 7b mov %gs:0x7bab5b8b(%rip),%eax # 0x7bab5bc1 36: 85 c0 test %eax,%eax 38: 74 02 je 0x3c 3a: 5b pop %rbx 3b: c3 ret 3c: e8 .byte 0xe8 3d: 14 22 adc $0x22,%al 3f: a9 .byte 0xa9