kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle page fault for address: ffffc90007f12210 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0011) - permissions violation PGD 1f5ca9067 P4D 1f5ca9067 PUD 1f5caa067 PMD 1f46c1067 PTE 80000001e93c3163 Oops: 0011 [#1] PREEMPT SMP KASAN CPU: 0 PID: 2627 Comm: syz.4.611 Not tainted 5.4.289-syzkaller-00011-g39762b7a60e9 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 RIP: 0010:0xffffc90007f12210 Code: Bad RIP value. RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010206 RAX: ffffffff8154e8aa RBX: 0000000000000103 RCX: ffff8881e5af8000 RDX: 0000000000000103 RSI: ffffc90007f12210 RDI: ffff8881e93c31c0 RBP: ffff8881f6e09ec8 R08: ffffffff8154e4ee R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffaa80 R13: dffffc0000000000 R14: ffffc90007f12210 R15: ffff8881e93c31c0 FS: 00007f7148dca6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90007f121e6 CR3: 00000001d8d71000 CR4: 00000000003406b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830 __do_softirq+0x23b/0x6b7 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x195/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:539 [inline] smp_apic_timer_interrupt+0x11a/0x490 arch/x86/kernel/apic/apic.c:1161 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834 RIP: 0010:__read_once_size include/linux/compiler.h:268 [inline] RIP: 0010:csd_lock_wait kernel/smp.c:109 [inline] RIP: 0010:smp_call_function_single+0x235/0x4a0 kernel/smp.c:311 Code: 0f 85 df 01 00 00 44 8b 74 24 58 44 89 f6 83 e6 01 31 ff e8 3d ab 0a 00 41 83 e6 01 75 0a e8 42 a8 0a 00 e9 f4 00 00 00 f3 90 <42> 0f b6 04 2b 84 c0 75 15 f7 44 24 58 01 00 00 00 0f 84 d6 00 00 RSP: 0018:ffff8881ce566f20 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 RAX: ffffffff8159a251 RBX: 1ffff11039cacdef RCX: ffff8881e5af8000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffff8881ce567010 R08: ffffffff8159a223 R09: ffffed103edeb189 R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff11039cacde8 R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000 smp_call_function_many+0x6fe/0x9b0 kernel/smp.c:451 smp_call_function kernel/smp.c:509 [inline] on_each_cpu+0xa5/0x1a0 kernel/smp.c:616 __purge_vmap_area_lazy+0xea/0x1610 mm/vmalloc.c:1278 _vm_unmap_aliases+0x2dd/0x370 mm/vmalloc.c:1707 change_page_attr_set_clr+0x304/0x1090 arch/x86/mm/pageattr.c:1713 change_page_attr_clear arch/x86/mm/pageattr.c:1770 [inline] set_memory_ro+0xa1/0xe0 arch/x86/mm/pageattr.c:1903 bpf_jit_binary_lock_ro include/linux/filter.h:863 [inline] bpf_int_jit_compile+0x877b/0x8c40 arch/x86/net/bpf_jit_comp.c:1195 bpf_prog_select_runtime+0x654/0x900 kernel/bpf/core.c:1786 bpf_prog_load kernel/bpf/syscall.c:1728 [inline] __do_sys_bpf kernel/bpf/syscall.c:2891 [inline] __se_sys_bpf+0x8193/0xbcb0 kernel/bpf/syscall.c:2849 do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x5c/0xc1 RIP: 0033:0x7f714a780de9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f7148dca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f714a99a080 RCX: 00007f714a780de9 RDX: 0000000000000048 RSI: 000040000000e000 RDI: 0000000000000005 RBP: 00007f714a8022a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f714a99a080 R15: 00007ffd7d9c6448 Modules linked in: CR2: ffffc90007f12210 ---[ end trace c44d26d0c948c404 ]--- RIP: 0010:0xffffc90007f12210 Code: Bad RIP value. RSP: 0018:ffff8881f6e09d18 EFLAGS: 00010206 RAX: ffffffff8154e8aa RBX: 0000000000000103 RCX: ffff8881e5af8000 RDX: 0000000000000103 RSI: ffffc90007f12210 RDI: ffff8881e93c31c0 RBP: ffff8881f6e09ec8 R08: ffffffff8154e4ee R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffaa80 R13: dffffc0000000000 R14: ffffc90007f12210 R15: ffff8881e93c31c0 FS: 00007f7148dca6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90007f121e6 CR3: 00000001d8d71000 CR4: 00000000003406b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 ---------------- Code disassembly (best guess): 0: 0f 85 df 01 00 00 jne 0x1e5 6: 44 8b 74 24 58 mov 0x58(%rsp),%r14d b: 44 89 f6 mov %r14d,%esi e: 83 e6 01 and $0x1,%esi 11: 31 ff xor %edi,%edi 13: e8 3d ab 0a 00 call 0xaab55 18: 41 83 e6 01 and $0x1,%r14d 1c: 75 0a jne 0x28 1e: e8 42 a8 0a 00 call 0xaa865 23: e9 f4 00 00 00 jmp 0x11c 28: f3 90 pause * 2a: 42 0f b6 04 2b movzbl (%rbx,%r13,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 75 15 jne 0x48 33: f7 44 24 58 01 00 00 testl $0x1,0x58(%rsp) 3a: 00 3b: 0f .byte 0xf 3c: 84 d6 test %dl,%dh