kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle page fault for address: ffffffff867908e0 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0011) - permissions violation PGD 6260067 P4D 6260067 PUD 6261063 PMD 80000000066001e3 Oops: 0011 [#1] PREEMPT SMP CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.8.0-rc3-syzkaller-00047-g047371968ffc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 RIP: 0010:hash_ipport_type+0x0/0x400 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 79 86 ff ff ff ff e0 0c 79 86 ff ff ff ff 68 61 73 68 3a 69 RSP: 0018:ffffc90000003ea0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff888139c44868 RCX: ffffffff81373710 RDX: ffffffff86229980 RSI: ffffffff813731a7 RDI: ffff888139c44868 RBP: 0000000080000101 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff867908e0 R13: 00000000ffffe2d0 R14: 0000000000000000 R15: dead000000000122 FS: 0000000000000000(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff867908e0 CR3: 00000001324f9000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Modules linked in: CR2: ffffffff867908e0 ---[ end trace 0000000000000000 ]--- RIP: 0010:hash_ipport_type+0x0/0x400 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 79 86 ff ff ff ff e0 0c 79 86 ff ff ff ff 68 61 73 68 3a 69 RSP: 0018:ffffc90000003ea0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff888139c44868 RCX: ffffffff81373710 RDX: ffffffff86229980 RSI: ffffffff813731a7 RDI: ffff888139c44868 RBP: 0000000080000101 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff867908e0 R13: 00000000ffffe2d0 R14: 0000000000000000 R15: dead000000000122 FS: 0000000000000000(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff867908e0 CR3: 00000001324f9000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 28: 00 00 add %al,(%rax) * 2a: e0 04 loopne 0x30 <-- trapping instruction 2c: 79 86 jns 0xffffffb4 2e: ff (bad) 2f: ff (bad) 30: ff (bad) 31: ff e0 jmp *%rax 33: 0c 79 or $0x79,%al 35: 86 ff xchg %bh,%bh 37: ff (bad) 38: ff (bad) 39: ff 68 61 ljmp *0x61(%rax) 3c: 73 68 jae 0xa6 3e: 3a .byte 0x3a 3f: 69 .byte 0x69