kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle page fault for address: ffff888061d49dc0 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0011) - permissions violation PGD 15401067 P4D 15401067 PUD 7964b063 PMD 8000000061c001e3 Oops: Oops: 0011 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 UID: 0 PID: 13502 Comm: syz.4.1912 Not tainted 6.11.0-rc1-syzkaller-00004-gdc1c8034e31b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 RIP: 0010:0xffff888061d49dc0 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <01> 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 RSP: 0018:ffffc900096878f8 EFLAGS: 00010286 RAX: 1ffff11009f7e5b6 RBX: ffff88804fbf2db0 RCX: dffffc0000000000 RDX: ffff88807e60f200 RSI: 0000000000000002 RDI: ffff88804fbf2da0 RBP: ffffc90009687a30 R08: ffff8880233ca0c7 R09: 1ffff11004679418 R10: dffffc0000000000 R11: ffff888061d49dc0 R12: ffff88807e60f200 R13: ffff88804fbf2da0 R14: ffff8880233ca150 R15: ffff8880233ca0b8 FS: 00007f300e4d76c0(0000) GS:ffff8880b9200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff888061d49dc0 CR3: 000000006db92000 CR4: 0000000000350ef0 Call Trace: mmap_region+0x1891/0x2090 mm/mmap.c:3058 do_mmap+0x8f9/0x1010 mm/mmap.c:1468 vm_mmap_pgoff+0x1dd/0x3d0 mm/util.c:588 ksys_mmap_pgoff+0x4f1/0x720 mm/mmap.c:1514 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f300d777299 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f300e4d7048 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f300d905f80 RCX: 00007f300d777299 RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000020001000 RBP: 00007f300d7e48e6 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000000010012 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f300d905f80 R15: 00007ffd96ec3b88 Modules linked in: CR2: ffff888061d49dc0 ---[ end trace 0000000000000000 ]--- RIP: 0010:0xffff888061d49dc0 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <01> 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 RSP: 0018:ffffc900096878f8 EFLAGS: 00010286 RAX: 1ffff11009f7e5b6 RBX: ffff88804fbf2db0 RCX: dffffc0000000000 RDX: ffff88807e60f200 RSI: 0000000000000002 RDI: ffff88804fbf2da0 RBP: ffffc90009687a30 R08: ffff8880233ca0c7 R09: 1ffff11004679418 R10: dffffc0000000000 R11: ffff888061d49dc0 R12: ffff88807e60f200 R13: ffff88804fbf2da0 R14: ffff8880233ca150 R15: ffff8880233ca0b8 FS: 00007f300e4d76c0(0000) GS:ffff8880b9200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff888061d49dc0 CR3: 000000006db92000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 28: 00 00 add %al,(%rax) * 2a: 01 00 add %eax,(%rax) <-- trapping instruction 34: 00 00 add %al,(%rax) 36: ad lods %ds:(%rsi),%eax 37: 4e ad rex.WRX lods %ds:(%rsi),%rax 39: de ff fdivrp %st,%st(7) 3b: ff (bad) 3c: ff (bad) 3d: ff 00 incl (%rax)