kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle page fault for address: ffff88806a638000 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0011) - permissions violation PGD 14e01067 P4D 14e01067 PUD 7b386063 PMD 800000006a6001e3 Oops: Oops: 0011 [#1] PREEMPT SMP KASAN NOPTI CPU: 0 UID: 0 PID: 13909 Comm: syz.4.2490 Not tainted 6.10.0-syzkaller-11840-g933069701c1b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 RIP: 0010:0xffff88806a638000 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <01> 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 RSP: 0018:ffffc900020df8f8 EFLAGS: 00010286 RAX: 1ffff110048e1e06 RBX: ffff88802470f030 RCX: dffffc0000000000 RDX: ffff88802a75df00 RSI: 0000000000000002 RDI: ffff88802470f020 RBP: ffffc900020dfa30 R08: ffff88802bd4d0c7 R09: 1ffff110057a9a18 R10: dffffc0000000000 R11: ffff88806a638000 R12: ffff88802a75df00 R13: ffff88802470f020 R14: ffff88802bd4d150 R15: ffff88802bd4d0b8 FS: 00007f8c3b80a6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88806a638000 CR3: 000000002b0d0000 CR4: 0000000000350ef0 Call Trace: mmap_region+0x1891/0x2090 mm/mmap.c:3028 do_mmap+0x8ad/0xfa0 mm/mmap.c:1438 vm_mmap_pgoff+0x1dd/0x3d0 mm/util.c:588 ksys_mmap_pgoff+0x4f1/0x720 mm/mmap.c:1484 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f8c3a975f19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f8c3b80a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f8c3ab05f60 RCX: 00007f8c3a975f19 RDX: 0000000000000005 RSI: 0000000000003000 RDI: 0000000020000000 RBP: 00007f8c3a9e4e68 R08: 0000000000000003 R09: 0000000000000000 R10: 0000000000000012 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f8c3ab05f60 R15: 00007ffd1a491ae8 Modules linked in: CR2: ffff88806a638000 ---[ end trace 0000000000000000 ]--- RIP: 0010:0xffff88806a638000 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <01> 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 RSP: 0018:ffffc900020df8f8 EFLAGS: 00010286 RAX: 1ffff110048e1e06 RBX: ffff88802470f030 RCX: dffffc0000000000 RDX: ffff88802a75df00 RSI: 0000000000000002 RDI: ffff88802470f020 RBP: ffffc900020dfa30 R08: ffff88802bd4d0c7 R09: 1ffff110057a9a18 R10: dffffc0000000000 R11: ffff88806a638000 R12: ffff88802a75df00 R13: ffff88802470f020 R14: ffff88802bd4d150 R15: ffff88802bd4d0b8 FS: 00007f8c3b80a6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88806a638000 CR3: 000000002b0d0000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 28: 00 00 add %al,(%rax) * 2a: 01 00 add %eax,(%rax) <-- trapping instruction 34: 00 00 add %al,(%rax) 36: ad lods %ds:(%rsi),%eax 37: 4e ad rex.WRX lods %ds:(%rsi),%rax 39: de ff fdivrp %st,%st(7) 3b: ff (bad) 3c: ff (bad) 3d: ff 00 incl (%rax)