kernel tried to execute NX-protected page - exploit attempt? (uid: 0) ================================================================== ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in ./include/linux/context_tracking.h:126:25 index 66 is out of range for type 'unsigned long[8]' CPU: 1 UID: 0 PID: 5332 Comm: syz.0.9 Not tainted 6.11.0-rc4-next-20240822-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:231 [inline] __ubsan_handle_out_of_bounds+0x121/0x150 lib/ubsan.c:429 rcu_is_watching_curr_cpu include/linux/context_tracking.h:126 [inline] rcu_is_watching+0xa5/0xb0 kernel/rcu/tree.c:737 kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle page fault for address: ffffffff8e07ec39 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0011) - permissions violation PGD e73a067 P4D e73a067 PUD e73b063 PMD 800000000e0001a1 Oops: Oops: 0011 [#1] PREEMPT SMP KASAN PTI CPU: 1 UID: 0 PID: 5332 Comm: syz.0.9 Not tainted 6.11.0-rc4-next-20240822-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:kallsyms_seqs_of_names+0x231ba1/0x4a38d8 Code: 38 20 31 31 20 66 6c 61 67 73 2e 69 2e 69 2e 69 20 36 34 20 31 30 34 20 31 20 6e 20 32 30 38 20 32 34 20 34 20 77 61 69 74 00 <32> 20 33 32 20 38 20 31 31 20 66 6c 61 67 73 2e 69 2e 69 2e 69 20 RSP: 0018:ffffc90004b34bd0 EFLAGS: 00010046 RAX: 01ab0efbb8a29e00 RBX: ffffffff8140766a RCX: 0000000000040000 RDX: ffffc900039f1000 RSI: 000000000003ffff RDI: 0000000000040000 RBP: 0000000041b58ab3 R08: ffffffff8bbedbcb R09: fffffbfff1d02a74 R10: dffffc0000000000 R11: fffffbfff1d02a74 R12: dffffc0000000000 R13: ffffc90004b34c00 R14: 0000000304b34c70 R15: ffffffff9317d1a0 FS: 00007fb1890c36c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff8e07ec39 CR3: 0000000075e8c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Modules linked in: CR2: ffffffff8e07ec39 ---[ end trace 0000000000000000 ]--- RIP: 0010:kallsyms_seqs_of_names+0x231ba1/0x4a38d8 Code: 38 20 31 31 20 66 6c 61 67 73 2e 69 2e 69 2e 69 20 36 34 20 31 30 34 20 31 20 6e 20 32 30 38 20 32 34 20 34 20 77 61 69 74 00 <32> 20 33 32 20 38 20 31 31 20 66 6c 61 67 73 2e 69 2e 69 2e 69 20 RSP: 0018:ffffc90004b34bd0 EFLAGS: 00010046 RAX: 01ab0efbb8a29e00 RBX: ffffffff8140766a RCX: 0000000000040000 RDX: ffffc900039f1000 RSI: 000000000003ffff RDI: 0000000000040000 RBP: 0000000041b58ab3 R08: ffffffff8bbedbcb R09: fffffbfff1d02a74 R10: dffffc0000000000 R11: fffffbfff1d02a74 R12: dffffc0000000000 R13: ffffc90004b34c00 R14: 0000000304b34c70 R15: ffffffff9317d1a0 FS: 00007fb1890c36c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff8e07ec39 CR3: 0000000075e8c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400