kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
BUG: unable to handle page fault for address: ffffffff8c38d580
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0011) - permissions violation
PGD e93c067 P4D e93c067 PUD e93d063 PMD 800000000c2001a1
Oops: Oops: 0011 [#1] PREEMPT SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 81 Comm: kswapd1 Not tainted 6.14.0-rc3-syzkaller-00060-g6537cfb395f3 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:.str.28+0x0/0x40
Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <26> 5f 5f 5f 5f 73 2d 3e 73 65 71 63 6f 75 6e 74 00 00 00 00 00 00
RSP: 0018:ffffc90000007bd8 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: 1ffff11007f76111 RCX: ffff888033500ae8
RDX: dffffc0000000000 RSI: ffffffff8c2ab6a0 RDI: ffff88803fbb0880
RBP: ffffc90000007e10 R08: ffffffff9454685f R09: 1ffffffff28a8d0b
R10: dffffc0000000000 R11: ffffffff8c38d580 R12: ffffffff81a8d327
R13: ffff88803fbb0888 R14: ffffffff8c38d580 R15: ffff88803fbb0880
FS: 0000000000000000(0000) GS:ffff88801fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff8c38d580 CR3: 0000000053cd0000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561
__do_softirq kernel/softirq.c:595 [inline]
invoke_softirq kernel/softirq.c:435 [inline]
__irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662
irq_exit_rcu+0x9/0x30 kernel/softirq.c:678
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1049
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:check_kcov_mode kernel/kcov.c:185 [inline]
RIP: 0010:write_comp_data kernel/kcov.c:246 [inline]
RIP: 0010:__sanitizer_cov_trace_switch+0xbc/0x120 kernel/kcov.c:351
Code: c2 49 39 d2 74 71 4c 8b 74 d6 10 65 8b 05 d4 15 42 7e 25 00 01 ff 00 74 11 3d 00 01 00 00 75 de 41 83 bb 2c 16 00 00 00 74 d4 <41> 8b 83 08 16 00 00 83 f8 03 75 c8 49 8b 8b 10 16 00 00 45 8b bb
RSP: 0018:ffffc9000125e5b0 EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffffffff8c8130b9 RCX: ffff888033500000
RDX: 0000000000000003 RSI: ffffffff8f2a7410 RDI: 0000000000000006
RBP: 0000000000000022 R08: 0000000000000005 R09: ffffffff84fd513e
R10: 0000000000000004 R11: ffff888033500000 R12: 0000000000000002
R13: ffff888040ee0000 R14: 0000000000000006 R15: dffffc0000000000
add_template lib/842/842_compress.c:264 [inline]
process_next lib/842/842_compress.c:460 [inline]
sw842_compress+0x1b5e/0x4880 lib/842/842_compress.c:543
scomp_acomp_comp_decomp+0x4ac/0x7c0
crypto_acomp_compress include/crypto/acompress.h:251 [inline]
zswap_compress mm/zswap.c:962 [inline]
zswap_store_page mm/zswap.c:1462 [inline]
zswap_store+0xc95/0x1c30 mm/zswap.c:1569
swap_writepage+0x647/0xce0 mm/page_io.c:278
pageout mm/vmscan.c:696 [inline]
shrink_folio_list+0x35c2/0x5ac0 mm/vmscan.c:1402
evict_folios+0x45fd/0x56a0 mm/vmscan.c:4660
try_to_shrink_lruvec+0x713/0x9b0 mm/vmscan.c:4821
shrink_one+0x3b9/0x850 mm/vmscan.c:4866
shrink_many mm/vmscan.c:4929 [inline]
lru_gen_shrink_node mm/vmscan.c:5007 [inline]
shrink_node+0x379b/0x3e20 mm/vmscan.c:5978
kswapd_shrink_node mm/vmscan.c:6807 [inline]
balance_pgdat mm/vmscan.c:6999 [inline]
kswapd+0x20f3/0x3b10 mm/vmscan.c:7264
kthread+0x7a9/0x920 kernel/kthread.c:464
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
Modules linked in:
CR2: ffffffff8c38d580
---[ end trace 0000000000000000 ]---
RIP: 0010:.str.28+0x0/0x40
Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <26> 5f 5f 5f 5f 73 2d 3e 73 65 71 63 6f 75 6e 74 00 00 00 00 00 00
RSP: 0018:ffffc90000007bd8 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: 1ffff11007f76111 RCX: ffff888033500ae8
RDX: dffffc0000000000 RSI: ffffffff8c2ab6a0 RDI: ffff88803fbb0880
RBP: ffffc90000007e10 R08: ffffffff9454685f R09: 1ffffffff28a8d0b
R10: dffffc0000000000 R11: ffffffff8c38d580 R12: ffffffff81a8d327
R13: ffff88803fbb0888 R14: ffffffff8c38d580 R15: ffff88803fbb0880
FS: 0000000000000000(0000) GS:ffff88801fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff8c38d580 CR3: 0000000053cd0000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
28: 00 00 add %al,(%rax)
* 2a: 26 5f es pop %rdi <-- trapping instruction
2c: 5f pop %rdi
2d: 5f pop %rdi
2e: 5f pop %rdi
2f: 73 2d jae 0x5e
31: 3e 73 65 jae,pt 0x99
34: 71 63 jno 0x99
36: 6f outsl %ds:(%rsi),(%dx)
37: 75 6e jne 0xa7
39: 74 00 je 0x3b
3b: 00 00 add %al,(%rax)
3d: 00 00 add %al,(%rax)