| 1 | [ 3792.320909] kernel tried to execute NX-protected page - exploit attempt? (uid: 1000)
|
|---|
| 2 | [ 3792.321002] BUG: unable to handle kernel paging request at f959a2a0
|
|---|
| 3 | [ 3792.321002] IP: [<f959a2a0>] 0xf959a29f
|
|---|
| 4 | [ 3792.321002] *pdpt = 0000000000d0e001 *pde = 00000000310ab067 *pte = 8000000178fd5163
|
|---|
| 5 | [ 3792.321002] Oops: 0011 [#1] SMP
|
|---|
| 6 | [ 3792.321002] Modules linked in: nfsv3 nfsv4 nfs dns_resolver fscache vboxpci(OF) vboxnetadp(OF) vboxnetflt(OF) vboxdrv(OF) fuse snd_hda_codec_analog snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm i915 snd_page_alloc snd_timer video coretemp snd i2c_algo_bit drm_kms_helper kvm_intel soundcore drm kvm ppdev i2c_i801 iTCO_wdt iTCO_vendor_support tg3 lpc_ich parport_pc ptp parport pps_core i2c_core mfd_core serio_raw dcdbas microcode nfsd auth_rpcgss nfs_acl lockd sunrpc
|
|---|
| 7 | [ 3792.321002] Pid: 1759, comm: EMT Tainted: GF C O 3.8.5-201.fc18.i686.PAE #1 Dell Inc. OptiPlex 745 /0HR330
|
|---|
| 8 | [ 3792.321002] EIP: 0060:[<f959a2a0>] EFLAGS: 00010286 CPU: 0
|
|---|
| 9 | [ 3792.321002] EIP is at 0xf959a2a0
|
|---|
| 10 | [ 3792.321002] EAX: ef5ba610 EBX: f10ec690 ECX: f959a2a0 EDX: f959b8b0
|
|---|
| 11 | [ 3792.321002] ESI: f842fb00 EDI: f9615010 EBP: eb467ed0 ESP: eb467e78
|
|---|
| 12 | [ 3792.321002] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
|
|---|
| 13 | [ 3792.321002] CR0: 80050033 CR2: f959a2a0 CR3: 32fee000 CR4: 000007f0
|
|---|
| 14 | [ 3792.321002] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
|
|---|
| 15 | [ 3792.353502] DR6: ffff0ff0 DR7: 00000400
|
|---|
| 16 | [ 3792.353502] Process EMT (pid: 1759, ti=eb466000 task=ef5ba610 task.ti=eb466000)
|
|---|
| 17 | [ 3792.353502] Stack:
|
|---|
| 18 | [ 3792.353502] f840621b f10ec690 f8424de8 f840e50c 00000000 000984b0 eb467ecc eb467eac
|
|---|
| 19 | [ 3792.353502] c053cb48 00000163 00002618 ffffffff f840e50c eb467ec4 f96a6d38 00000011
|
|---|
| 20 | [ 3792.353502] f959b5f0 f959b8b0 c06976e1 00005604 eb3543c0 acd9d008 eb467f18 f84013a7
|
|---|
| 21 | [ 3792.353502] Call Trace:
|
|---|
| 22 | [ 3792.353502] [<f840621b>] ? supdrvIOCtl+0x12db/0x2c10 [vboxdrv]
|
|---|
| 23 | [ 3792.353502] [<f840e50c>] ? rtR0MemAllocEx+0x2c/0xc0 [vboxdrv]
|
|---|
| 24 | [ 3792.353502] [<c053cb48>] ? vmalloc+0x38/0x40
|
|---|
| 25 | [ 3792.353502] [<f840e50c>] ? rtR0MemAllocEx+0x2c/0xc0 [vboxdrv]
|
|---|
| 26 | [ 3792.353502] [<c06976e1>] ? _copy_from_user+0x41/0x60
|
|---|
| 27 | [ 3792.353502] [<f84013a7>] VBoxDrvLinuxIOCtl_4_2_10+0xf7/0x1e0 [vboxdrv]
|
|---|
| 28 | [ 3792.353502] [<f84012b0>] ? SUPR0Printf+0x70/0x70 [vboxdrv]
|
|---|
| 29 | [ 3792.353502] [<c056983a>] do_vfs_ioctl+0x7a/0x590
|
|---|
| 30 | [ 3792.353502] [<c099d93f>] ? __do_page_fault+0x22f/0x490
|
|---|
| 31 | [ 3792.353502] [<c0569dbb>] sys_ioctl+0x6b/0x80
|
|---|
| 32 | [ 3792.353502] [<c09a15cd>] sysenter_do_call+0x12/0x28
|
|---|
| 33 | [ 3792.353502] Code: 89 ec 5d c3 8d b4 26 00 00 00 00 83 fa 07 74 e7 8b 5d f8 8b 75 fc 89 ec 5d e9 8d 18 05 00 8d b6 00 00 00 00 8d bc 27 00 00 00 00 <55> 89 e5 53 83 ec 24 8b 45 08 c7 44 24 04 20 00 61 f9 89 04 24
|
|---|
| 34 | [ 3792.353502] EIP: [<f959a2a0>] 0xf959a2a0 SS:ESP 0068:eb467e78
|
|---|
| 35 | [ 3792.353502] CR2: 00000000f959a2a0
|
|---|
| 36 | [ 3792.430387] ---[ end trace c7af6e951cbe4c99 ]---
|
|---|