kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle page fault for address: ffff8881e634b3f0 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0011) - permissions violation PGD 7801067 P4D 7801067 PUD 1e20b8063 PMD 1d7816063 PTE 80000001e634b163 Oops: 0011 [#1] PREEMPT SMP KASAN CPU: 1 PID: 3335 Comm: syz.8.861 Not tainted 5.4.290-syzkaller-00002-g41adfeb3d639 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 RIP: 0010:0xffff8881e634b3f0 Code: 00 00 00 b0 34 e6 81 88 ff ff 91 b3 34 e6 81 88 ff ff b0 b3 34 e6 81 88 ff ff f0 b1 34 e6 81 88 ff ff 00 b0 34 e6 81 88 ff ff b1 34 e6 81 88 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010202 RAX: ffffffff8154e8ca RBX: 0000000000000101 RCX: ffff8881eacd4ec0 RDX: 0000000000000101 RSI: ffff8881e634b3f0 RDI: ffff8881e634b1c0 RBP: ffff8881f6f09ec8 R08: ffffffff8154e50e R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffb440 R13: dffffc0000000000 R14: ffff8881e634b3f0 R15: ffff8881e634b1c0 FS: 00007f114b6636c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8881e634b3f0 CR3: 00000001e027c000 CR4: 00000000003406a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1830 __do_softirq+0x23b/0x6b7 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x195/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:539 [inline] smp_apic_timer_interrupt+0x11a/0x490 arch/x86/kernel/apic/apic.c:1161 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834 RIP: 0010:__alloc_pages include/linux/gfp.h:503 [inline] RIP: 0010:__alloc_pages_node include/linux/gfp.h:516 [inline] RIP: 0010:alloc_pages_node include/linux/gfp.h:530 [inline] RIP: 0010:__get_free_pages+0x3/0x30 mm/page_alloc.c:4937 Code: 80 c1 03 38 c1 0f 8c 2d da ff ff 48 8d bc 24 20 02 00 00 e8 ef d0 03 00 e9 1b da ff ff e8 65 89 aa ff 0f 1f 44 00 00 83 e7 fd <31> c9 e8 06 a3 ff ff 48 89 c1 48 c1 e1 06 48 ba 00 00 00 00 80 08 RSP: 0018:ffff8881de767650 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13 RAX: ffff8881eacd4ec0 RBX: ffff8881de767a24 RCX: 0000000000000002 RDX: ffffc9000895a000 RSI: 0000000000000000 RDI: 0000000000002800 RBP: 0000000000000002 R08: ffffffff818d6521 R09: fffff94000f171f7 R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881de767a28 R13: 1ffff1103bcecf44 R14: 1ffff1103bcecf45 R15: 0000000000000000 tlb_next_batch mm/mmu_gather.c:29 [inline] __tlb_remove_page_size+0x16b/0x2f0 mm/mmu_gather.c:83 __tlb_remove_page include/asm-generic/tlb.h:426 [inline] zap_pte_range mm/memory.c:1108 [inline] zap_pmd_range mm/memory.c:1222 [inline] zap_pud_range mm/memory.c:1251 [inline] zap_p4d_range mm/memory.c:1272 [inline] unmap_page_range+0x11b3/0x2620 mm/memory.c:1293 unmap_single_vma mm/memory.c:1338 [inline] unmap_vmas+0x355/0x4b0 mm/memory.c:1370 exit_mmap+0x2bc/0x520 mm/mmap.c:3191 __mmput+0x8e/0x2c0 kernel/fork.c:1101 copy_process+0x1f42/0x3230 kernel/fork.c:2298 _do_fork+0x197/0x900 kernel/fork.c:2399 __do_sys_clone kernel/fork.c:2557 [inline] __se_sys_clone kernel/fork.c:2538 [inline] __x64_sys_clone+0x26b/0x2c0 kernel/fork.c:2538 do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x5c/0xc1 RIP: 0033:0x7f114cffa169 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f114b662fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f114d221fa0 RCX: 00007f114cffa169 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040b04000 RBP: 00007f114d07ca68 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f114d221fa0 R15: 00007ffff206f178 Modules linked in: CR2: ffff8881e634b3f0 ---[ end trace f3fb167207c6858d ]--- RIP: 0010:0xffff8881e634b3f0 Code: 00 00 00 b0 34 e6 81 88 ff ff 91 b3 34 e6 81 88 ff ff b0 b3 34 e6 81 88 ff ff f0 b1 34 e6 81 88 ff ff 00 b0 34 e6 81 88 ff ff b1 34 e6 81 88 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010202 RAX: ffffffff8154e8ca RBX: 0000000000000101 RCX: ffff8881eacd4ec0 RDX: 0000000000000101 RSI: ffff8881e634b3f0 RDI: ffff8881e634b1c0 RBP: ffff8881f6f09ec8 R08: ffffffff8154e50e R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffb440 R13: dffffc0000000000 R14: ffff8881e634b3f0 R15: ffff8881e634b1c0 FS: 00007f114b6636c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8881e634b3f0 CR3: 00000001e027c000 CR4: 00000000003406a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 ---------------- Code disassembly (best guess): 0: 80 c1 03 add $0x3,%cl 3: 38 c1 cmp %al,%cl 5: 0f 8c 2d da ff ff jl 0xffffda38 b: 48 8d bc 24 20 02 00 lea 0x220(%rsp),%rdi 12: 00 13: e8 ef d0 03 00 call 0x3d107 18: e9 1b da ff ff jmp 0xffffda38 1d: e8 65 89 aa ff call 0xffaa8987 22: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 27: 83 e7 fd and $0xfffffffd,%edi * 2a: 31 c9 xor %ecx,%ecx <-- trapping instruction 2c: e8 06 a3 ff ff call 0xffffa337 31: 48 89 c1 mov %rax,%rcx 34: 48 c1 e1 06 shl $0x6,%rcx 38: 48 rex.W 39: ba 00 00 00 00 mov $0x0,%edx 3e: 80 .byte 0x80 3f: 08 .byte 0x8