kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle page fault for address: ffffea00079d7700 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0011) - permissions violation PGD 237ff3067 P4D 237ff3067 PUD 237ff2067 PMD 800000023e8001e3 Oops: 0011 [#1] PREEMPT SMP KASAN CPU: 1 PID: 2310 Comm: syz.1.509 Not tainted 5.4.289-syzkaller-00030-gcb850525fc3e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 RIP: 0010:0xffffea00079d7700 Code: ad de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 80 00 01 00 00 00 00 ad de 22 01 00 00 00 00 RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010002 RAX: ffffffff8154e8aa RBX: 0000000000000101 RCX: ffff8881e5e0cec0 RDX: 0000000000000101 RSI: ffffea00079d7700 RDI: ffff8881ed8b71c0 RBP: ffff8881f6f09ec8 R08: ffffffff8154e4ee R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffaa78 R13: dffffc0000000000 R14: ffffea00079d7700 R15: ffff8881ed8b71c0 FS: 00007f50954376c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffea00079d7700 CR3: 00000001cd41b000 CR4: 00000000003406a0 DR0: ffffffffffffffff DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830 __do_softirq+0x23b/0x6b7 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x195/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:539 [inline] smp_apic_timer_interrupt+0x11a/0x490 arch/x86/kernel/apic/apic.c:1161 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834 RIP: 0010:schedule_debug kernel/sched/core.c:4106 [inline] RIP: 0010:__schedule+0x132/0x1320 kernel/sched/core.c:4239 Code: 74 08 48 89 df e8 5e ed 3d fd 48 8b 1b 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 45 ed 3d fd 48 81 3b 9d 6e ac 57 <0f> 85 bc 0d 00 00 65 8b 05 1d 46 ac 7b 25 ff ff ff 7f 83 f8 01 0f RSP: 0018:ffff8881d7e670a0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 RAX: 1ffff1103afcc000 RBX: ffff8881d7e60000 RCX: 0000000000080000 RDX: ffffc90000940000 RSI: 00000000000091d7 RDI: 00000000000091d8 RBP: ffff8881d7e67190 R08: ffffffff8231cac1 R09: ffff8881d7e67610 R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 R13: 0000000000000001 R14: ffff8881f6f00000 R15: dffffc0000000000 preempt_schedule_common+0x83/0xd0 kernel/sched/core.c:4456 preempt_schedule+0xd9/0xe0 kernel/sched/core.c:4481 ___preempt_schedule+0x16/0x20 arch/x86/entry/thunk_64.S:50 unwind_next_frame+0x19c2/0x1ea0 arch/x86/kernel/unwind_orc.c:603 arch_stack_walk+0x111/0x140 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x118/0x1c0 kernel/stacktrace.c:123 save_stack mm/kasan/common.c:70 [inline] set_track mm/kasan/common.c:78 [inline] __kasan_kmalloc+0x171/0x210 mm/kasan/common.c:529 slab_post_alloc_hook mm/slab.h:584 [inline] slab_alloc_node mm/slub.c:2829 [inline] slab_alloc mm/slub.c:2837 [inline] __kmalloc_track_caller+0x100/0x2b0 mm/slub.c:4449 kstrdup+0x31/0x70 mm/util.c:60 trace_probe_init+0x2a6/0x370 kernel/trace/trace_probe.c:1014 alloc_trace_uprobe kernel/trace/trace_uprobe.c:348 [inline] create_local_trace_uprobe+0x192/0x6f0 kernel/trace/trace_uprobe.c:1584 perf_uprobe_init+0xed/0x190 kernel/trace/trace_event_perf.c:323 perf_uprobe_event_init+0xda/0x170 kernel/events/core.c:9055 perf_try_init_event+0x130/0x3e0 kernel/events/core.c:10357 perf_init_event kernel/events/core.c:10401 [inline] perf_event_alloc+0xd82/0x1b30 kernel/events/core.c:10678 __do_sys_perf_event_open kernel/events/core.c:11160 [inline] __se_sys_perf_event_open+0x734/0x37c0 kernel/events/core.c:11052 do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x5c/0xc1 RIP: 0033:0x7f5096dccde9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f5095437038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: ffffffffffffffda RBX: 00007f5096fe5fa0 RCX: 00007f5096dccde9 RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000400000001080 RBP: 00007f5096e4e2a0 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f5096fe5fa0 R15: 00007ffedaaea888 Modules linked in: CR2: ffffea00079d7700 ---[ end trace 83d976871cac1d43 ]--- RIP: 0010:0xffffea00079d7700 Code: ad de 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 80 00 01 00 00 00 00 ad de 22 01 00 00 00 00 RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010002 RAX: ffffffff8154e8aa RBX: 0000000000000101 RCX: ffff8881e5e0cec0 RDX: 0000000000000101 RSI: ffffea00079d7700 RDI: ffff8881ed8b71c0 RBP: ffff8881f6f09ec8 R08: ffffffff8154e4ee R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffaa78 R13: dffffc0000000000 R14: ffffea00079d7700 R15: ffff8881ed8b71c0 FS: 00007f50954376c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffea00079d7700 CR3: 00000001cd41b000 CR4: 00000000003406a0 DR0: ffffffffffffffff DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 ---------------- Code disassembly (best guess): 0: 74 08 je 0xa 2: 48 89 df mov %rbx,%rdi 5: e8 5e ed 3d fd call 0xfd3ded68 a: 48 8b 1b mov (%rbx),%rbx d: 48 89 d8 mov %rbx,%rax 10: 48 c1 e8 03 shr $0x3,%rax 14: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) 19: 74 08 je 0x23 1b: 48 89 df mov %rbx,%rdi 1e: e8 45 ed 3d fd call 0xfd3ded68 23: 48 81 3b 9d 6e ac 57 cmpq $0x57ac6e9d,(%rbx) * 2a: 0f 85 bc 0d 00 00 jne 0xdec <-- trapping instruction 30: 65 8b 05 1d 46 ac 7b mov %gs:0x7bac461d(%rip),%eax # 0x7bac4654 37: 25 ff ff ff 7f and $0x7fffffff,%eax 3c: 83 f8 01 cmp $0x1,%eax 3f: 0f .byte 0xf