kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
==================================================================
------------[ cut here ]------------
UBSAN: array-index-out-of-bounds in ./include/linux/context_tracking.h:126:25
index 66 is out of range for type 'unsigned long[8]'
CPU: 1 UID: 0 PID: 5332 Comm: syz.0.9 Not tainted 6.11.0-rc4-next-20240822-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
ubsan_epilogue lib/ubsan.c:231 [inline]
__ubsan_handle_out_of_bounds+0x121/0x150 lib/ubsan.c:429
rcu_is_watching_curr_cpu include/linux/context_tracking.h:126 [inline]
rcu_is_watching+0xa5/0xb0 kernel/rcu/tree.c:737
kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
BUG: unable to handle page fault for address: ffffffff8e07ec39
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0011) - permissions violation
PGD e73a067 P4D e73a067 PUD e73b063 PMD 800000000e0001a1
Oops: Oops: 0011 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 5332 Comm: syz.0.9 Not tainted 6.11.0-rc4-next-20240822-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:kallsyms_seqs_of_names+0x231ba1/0x4a38d8
Code: 38 20 31 31 20 66 6c 61 67 73 2e 69 2e 69 2e 69 20 36 34 20 31 30 34 20 31 20 6e 20 32 30 38 20 32 34 20 34 20 77 61 69 74 00 <32> 20 33 32 20 38 20 31 31 20 66 6c 61 67 73 2e 69 2e 69 2e 69 20
RSP: 0018:ffffc90004b34bd0 EFLAGS: 00010046
RAX: 01ab0efbb8a29e00 RBX: ffffffff8140766a RCX: 0000000000040000
RDX: ffffc900039f1000 RSI: 000000000003ffff RDI: 0000000000040000
RBP: 0000000041b58ab3 R08: ffffffff8bbedbcb R09: fffffbfff1d02a74
R10: dffffc0000000000 R11: fffffbfff1d02a74 R12: dffffc0000000000
R13: ffffc90004b34c00 R14: 0000000304b34c70 R15: ffffffff9317d1a0
FS: 00007fb1890c36c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff8e07ec39 CR3: 0000000075e8c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
Modules linked in:
CR2: ffffffff8e07ec39
---[ end trace 0000000000000000 ]---
RIP: 0010:kallsyms_seqs_of_names+0x231ba1/0x4a38d8
Code: 38 20 31 31 20 66 6c 61 67 73 2e 69 2e 69 2e 69 20 36 34 20 31 30 34 20 31 20 6e 20 32 30 38 20 32 34 20 34 20 77 61 69 74 00 <32> 20 33 32 20 38 20 31 31 20 66 6c 61 67 73 2e 69 2e 69 2e 69 20
RSP: 0018:ffffc90004b34bd0 EFLAGS: 00010046
RAX: 01ab0efbb8a29e00 RBX: ffffffff8140766a RCX: 0000000000040000
RDX: ffffc900039f1000 RSI: 000000000003ffff RDI: 0000000000040000
RBP: 0000000041b58ab3 R08: ffffffff8bbedbcb R09: fffffbfff1d02a74
R10: dffffc0000000000 R11: fffffbfff1d02a74 R12: dffffc0000000000
R13: ffffc90004b34c00 R14: 0000000304b34c70 R15: ffffffff9317d1a0
FS: 00007fb1890c36c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff8e07ec39 CR3: 0000000075e8c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400