kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle page fault for address: ffff8880b9100000 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0011) - permissions violation PGD 15401067 P4D 15401067 PUD 23ffff067 PMD 80000000b90000e3 Oops: Oops: 0011 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 5471 Comm: syz.4.33 Not tainted 6.11.0-rc5-next-20240827-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:0xffff8880b9100000 Code: 72 00 00 00 00 00 00 00 00 00 64 62 75 73 5f 6d 65 73 73 61 67 65 5f 68 61 73 5f 64 65 73 74 69 6e 61 74 69 6f 6e 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc900042b5228 EFLAGS: 00010087 RAX: ffffffff81559c9d RBX: 0000000000000000 RCX: 0000000000040000 RDX: ffffc9000a89d000 RSI: 000000000000033e RDI: 000000000000033f RBP: ffffc900042b53f8 R08: ffffffff81559c7d R09: fffff52000856a34 R10: dffffc0000000000 R11: fffff52000856a34 R12: 1ffff92000856a58 R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000002 FS: 00007ff37ddde6c0(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8880b9100000 CR3: 000000007daf4000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: do_user_addr_fault arch/x86/mm/fault.c:1248 [inline] handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x603/0x8c0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:memset_orig+0x98/0xb0 arch/x86/lib/memset_64.S:110 Code: 00 00 ff c9 48 89 07 48 8d 7f 08 75 f5 83 e2 07 74 0a ff ca 88 07 48 8d 7f 01 75 f6 4c 89 d0 c3 cc cc cc cc 48 83 fa 07 76 e3 <48> 89 07 49 c7 c0 08 00 00 00 4d 29 c8 4c 01 c7 4c 29 c2 e9 72 ff RSP: 0018:ffffc900042b5518 EFLAGS: 00010006 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 0000000000000018 RSI: 0000000000000000 RDI: 0000000000000001 RBP: ffffc900042b5660 R08: 0000000000000019 R09: 0000000000000001 R10: 0000000000000001 R11: fffff52000856abc R12: 1ffff92000856ae0 R13: dffffc0000000000 R14: 0000000000000000 R15: ffffffff931831a0 panic+0xa9/0x880 kernel/panic.c:290 __stack_chk_fail+0x15/0x20 kernel/panic.c:836 oops_begin+0xb6/0xc0 Modules linked in: CR2: ffff8880b9100000 ---[ end trace 0000000000000000 ]--- RIP: 0010:0xffff8880b9100000 Code: 72 00 00 00 00 00 00 00 00 00 64 62 75 73 5f 6d 65 73 73 61 67 65 5f 68 61 73 5f 64 65 73 74 69 6e 61 74 69 6f 6e 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc900042b5228 EFLAGS: 00010087 RAX: ffffffff81559c9d RBX: 0000000000000000 RCX: 0000000000040000 RDX: ffffc9000a89d000 RSI: 000000000000033e RDI: 000000000000033f RBP: ffffc900042b53f8 R08: ffffffff81559c7d R09: fffff52000856a34 R10: dffffc0000000000 R11: fffff52000856a34 R12: 1ffff92000856a58 R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000002 FS: 00007ff37ddde6c0(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8880b9100000 CR3: 000000007daf4000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: ff c9 dec %ecx 4: 48 89 07 mov %rax,(%rdi) 7: 48 8d 7f 08 lea 0x8(%rdi),%rdi b: 75 f5 jne 0x2 d: 83 e2 07 and $0x7,%edx 10: 74 0a je 0x1c 12: ff ca dec %edx 14: 88 07 mov %al,(%rdi) 16: 48 8d 7f 01 lea 0x1(%rdi),%rdi 1a: 75 f6 jne 0x12 1c: 4c 89 d0 mov %r10,%rax 1f: c3 ret 20: cc int3 21: cc int3 22: cc int3 23: cc int3 24: 48 83 fa 07 cmp $0x7,%rdx 28: 76 e3 jbe 0xd * 2a: 48 89 07 mov %rax,(%rdi) <-- trapping instruction 2d: 49 c7 c0 08 00 00 00 mov $0x8,%r8 34: 4d 29 c8 sub %r9,%r8 37: 4c 01 c7 add %r8,%rdi 3a: 4c 29 c2 sub %r8,%rdx 3d: e9 .byte 0xe9 3e: 72 ff jb 0x3f