kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
BUG: unable to handle page fault for address: ffff8881e518bbd0
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0011) - permissions violation
PGD 7801067 P4D 7801067 PUD 1e1ac6063 PMD 80000001e50001e3
Oops: 0011 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 835 Comm: syz.0.126 Not tainted 5.4.290-syzkaller-00017-g6b07fcd94a6a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
RIP: 0010:0xffff8881e518bbd0
Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 90 b1 18 e5 81 88 ff ff e0 0c 26 85 ff ff ff ff <01> 00 00 00 00 00 00 00 40 5a 53 ea 81 88 ff ff 18 50 53 ea 81 88
RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010202
RAX: ffffffff8154e8ca RBX: 0000000000000101 RCX: ffff8881e0b78000
RDX: 0000000000000101 RSI: ffff8881e518bbd0 RDI: ffff8881e518b1c0
RBP: ffff8881f6f09ec8 R08: ffffffff8154e50e R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffff9820
R13: dffffc0000000000 R14: ffff8881e518bbd0 R15: ffff8881e518b1c0
FS: 00007f25238a16c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff8881e518bbd0 CR3: 00000001d5ba2000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830
__do_softirq+0x23b/0x6b7 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:373 [inline]
irq_exit+0x195/0x1c0 kernel/softirq.c:413
exiting_irq arch/x86/include/asm/apic.h:539 [inline]
smp_apic_timer_interrupt+0x11a/0x490 arch/x86/kernel/apic/apic.c:1161
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834
RIP: 0010:__raw_spin_unlock_irq include/linux/spinlock_api_smp.h:169 [inline]
RIP: 0010:_raw_spin_unlock_irq+0x45/0x60 kernel/locking/spinlock.c:199
Code: 08 00 74 0c 48 c7 c7 90 3c eb 85 e8 55 03 3d fd 48 83 3d ad 0a 94 01 00 74 29 48 89 df e8 a3 d5 f4 fc 66 90 fb bf 01 00 00 00 d6 bf ed fc 65 8b 05 8b 5b ab 7b 85 c0 74 02 5b c3 e8 14 22 a9
RSP: 0018:ffff8881c8587610 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13
RAX: 0000000000000001 RBX: ffff8881d503d6b8 RCX: dffffc0000000000
RDX: ffffc90000d41000 RSI: 0000000000051a36 RDI: 0000000000000001
RBP: ffff8881c8587790 R08: ffffffff8231cd01 R09: fffff94000e7bce1
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000001
R13: 1ffff110390b0ede R14: dffffc0000000000 R15: ffff8881c85876e0
spin_unlock_irq include/linux/spinlock.h:388 [inline]
shmem_add_to_page_cache+0xa15/0xcb0 mm/shmem.c:652
shmem_getpage_gfp+0x118f/0x2440 mm/shmem.c:1890
shmem_getpage mm/shmem.c:154 [inline]
shmem_write_begin+0xc9/0x1a0 mm/shmem.c:2447
generic_perform_write+0x2c7/0x560 mm/filemap.c:3450
__generic_file_write_iter+0x224/0x530 mm/filemap.c:3579
generic_file_write_iter+0x455/0x5f0 mm/filemap.c:3611
call_write_iter include/linux/fs.h:1991 [inline]
new_sync_write fs/read_write.c:483 [inline]
__vfs_write+0x5d3/0x750 fs/read_write.c:496
vfs_write+0x206/0x4e0 fs/read_write.c:558
ksys_write+0x199/0x2c0 fs/read_write.c:611
do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x5c/0xc1
RIP: 0033:0x7f2525237169
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f25238a1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007f252544ffa0 RCX: 00007f2525237169
RDX: 00000000fffffdef RSI: 0000400000000140 RDI: 0000000000000006
RBP: 00007f25252b82a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f252544ffa0 R15: 00007ffe00c04488
Modules linked in:
CR2: ffff8881e518bbd0
---[ end trace 12dcc3774356aad4 ]---
RIP: 0010:0xffff8881e518bbd0
Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 90 b1 18 e5 81 88 ff ff e0 0c 26 85 ff ff ff ff <01> 00 00 00 00 00 00 00 40 5a 53 ea 81 88 ff ff 18 50 53 ea 81 88
RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010202
RAX: ffffffff8154e8ca RBX: 0000000000000101 RCX: ffff8881e0b78000
RDX: 0000000000000101 RSI: ffff8881e518bbd0 RDI: ffff8881e518b1c0
RBP: ffff8881f6f09ec8 R08: ffffffff8154e50e R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffff9820
R13: dffffc0000000000 R14: ffff8881e518bbd0 R15: ffff8881e518b1c0
FS: 00007f25238a16c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff8881e518bbd0 CR3: 00000001d5ba2000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 08 00 or %al,(%rax)
2: 74 0c je 0x10
4: 48 c7 c7 90 3c eb 85 mov $0xffffffff85eb3c90,%rdi
b: e8 55 03 3d fd call 0xfd3d0365
10: 48 83 3d ad 0a 94 01 cmpq $0x0,0x1940aad(%rip) # 0x1940ac5
17: 00
18: 74 29 je 0x43
1a: 48 89 df mov %rbx,%rdi
1d: e8 a3 d5 f4 fc call 0xfcf4d5c5
22: 66 90 xchg %ax,%ax
24: fb sti
25: bf 01 00 00 00 mov $0x1,%edi
* 2a: e8 d6 bf ed fc call 0xfcedc005 <-- trapping instruction
2f: 65 8b 05 8b 5b ab 7b mov %gs:0x7bab5b8b(%rip),%eax # 0x7bab5bc1
36: 85 c0 test %eax,%eax
38: 74 02 je 0x3c
3a: 5b pop %rbx
3b: c3 ret
3c: e8 .byte 0xe8
3d: 14 22 adc $0x22,%al
3f: a9 .byte 0xa9