kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: kernel NULL pointer dereference, address: 000000000000000f #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0010) - not-present page PGD 800000007bdbc067 P4D 800000007bdbc067 PUD 2dba8067 PMD 0 Oops: Oops: 0010 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 5335 Comm: syz.1.9 Not tainted 6.11.0-rc4-next-20240820-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:0xf Code: Unable to access opcode bytes at 0xffffffffffffffe5. RSP: 0018:ffffc900041a7460 EFLAGS: 00010046 RAX: 0000000000000045 RBX: ffff888015880400 RCX: 38548402976fa800 RDX: 0000000000000000 RSI: 0000000080000002 RDI: 0000000000000000 RBP: ffffc900041a75f0 R08: ffffffff81744bbc R09: fffffbfff1cfa354 R10: dffffc0000000000 R11: fffffbfff1cfa354 R12: ffffc900041a76c0 R13: ffffffff81964384 R14: ffff8880238caa08 R15: ffff8880154028d8 FS: 000055556f107500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffe5 CR3: 00000000799a6000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __bad_area_nosemaphore+0x118/0x770 arch/x86/mm/fault.c:785 Modules linked in: CR2: 000000000000000f ---[ end trace 0000000000000000 ]--- RIP: 0010:0xf Code: Unable to access opcode bytes at 0xffffffffffffffe5. RSP: 0018:ffffc900041a7460 EFLAGS: 00010046 RAX: 0000000000000045 RBX: ffff888015880400 RCX: 38548402976fa800 RDX: 0000000000000000 RSI: 0000000080000002 RDI: 0000000000000000 RBP: ffffc900041a75f0 R08: ffffffff81744bbc R09: fffffbfff1cfa354 R10: dffffc0000000000 R11: fffffbfff1cfa354 R12: ffffc900041a76c0 R13: ffffffff81964384 R14: ffff8880238caa08 R15: ffff8880154028d8 FS: 000055556f107500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffffffffe5 CR3: 00000000799a6000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400