Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: refill_stock+0x467/0x470
BUG: kernel NULL pointer dereference, address: 0000000000000011
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0010) - not-present page
PGD 800000002b385067 P4D 800000002b385067 PUD 1f64e067 PMD 0
Oops: Oops: 0010 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 5370 Comm: syz.2.15 Not tainted 6.11.0-rc4-next-20240820-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0000:die_lock+0x0/0x4
Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <01> 01 04 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RSP: 0000:000400000424e4e0 EFLAGS: ffff8880b903f994 ORIG_RAX: 1ffffffff2625434
RAX: ffffc9000424e560 RBX: 0000000000000000 RCX: ffffc9000424e5e0
RDX: ffffffff8bc53cca RSI: 0000000000006432 RDI: 0000000000006433
RBP: ffffffff817a1915 R08: ffffffff9312a1a0 R09: 1ffff92000849cac
R10: dffffc0000000000 R11: ffff8880b9000000 R12: ffffffff9312a1a0
R13: ffff8880b9000000 R14: 0000000000000000 R15: 0000000000000000
FS: 00007f22cca766c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000
CS: 0000 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000011 CR3: 000000002d7bc000 CR4: 00000000003506f0
Call Trace:
<TASK>
</TASK>
Modules linked in:
CR2: 0000000000000011
---[ end trace 0000000000000000 ]---
RIP: 0000:die_lock+0x0/0x4
kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
BUG: unable to handle page fault for address: ffffffff8c099782
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0011) - permissions violation
PGD e73a067 P4D e73a067 PUD e73b063 PMD 800000000c0001a1
Oops: Oops: 0011 [#3] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 5370 Comm: syz.2.15 Tainted: G D 6.11.0-rc4-next-20240820-syzkaller #0
Tainted: [D]=DIE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:.str.43+0x2/0x20
Code: 00 00 00 00 00 00 00 00 54 61 69 6e 74 65 64 3a 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 25 73 <5b> 25 63 5d 3d 25 73 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RSP: 0073:ffffc9000424e188 EFLAGS: 00010046
RAX: 000000000000001a RBX: ffffffff9312a1a8 RCX: 33a2a0c080b3ba00
RDX: ffffc9000b1fa000 RSI: 000000000002bb23 RDI: 000000000002bb24
RBP: ffffffff8c099783 R08: ffffffff81744bbc R09: 1ffff1101722519a
R10: dffffc0000000000 R11: ffffed101722519b R12: 1ffff92000849c54
R13: dffffc0000000000 R14: ffffffff8e173979 R15: 0000000000000002
FS: 00007f22cca766c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff8c099782 CR3: 000000002d7bc000 CR4: 00000000003506f0
Call Trace:
<TASK>
</TASK>
Modules linked in:
CR2: ffffffff8c099782
---[ end trace 0000000000000000 ]---
RIP: 0000:die_lock+0x0/0x4
Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RSP: 0000:000400000424e4e0 EFLAGS: ffff8880b903f994 ORIG_RAX: 1ffffffff2625434
RAX: ffffc9000424e560 RBX: 0000000000000000 RCX: ffffc9000424e5e0
RDX: ffffffff8bc53cca RSI: 0000000000006432 RDI: 0000000000006433
RBP: ffffffff817a1915 R08: ffffffff9312a1a0 R09: 1ffff92000849cac
R10: dffffc0000000000 R11: ffff8880b9000000 R12: ffffffff9312a1a0
R13: ffff8880b9000000 R14: 0000000000000000 R15: 0000000000000000
FS: 00007f22cca766c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000
CS: 0000 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff8c099782 CR3: 000000002d7bc000 CR4: 00000000003506f0
----------------
Code disassembly (best guess):
28: 00 00 add %al,(%rax)
* 2a: 01 01 add %eax,(%rcx) <-- trapping instruction
2c: 04 00 add $0x0,%al
2e: 01 00 add %eax,(%rax)