kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
BUG: unable to handle page fault for address: ffff8881c0b33720
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0011) - permissions violation
PGD 7801067 P4D 7801067 PUD 1e4573063 PMD 1daeb5063 PTE 80000001c0b33163
Oops: 0011 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 23056 Comm: syz-executor.5 Not tainted 5.4.249-syzkaller-00007-gba2c000ce64e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
RIP: 0010:0xffff8881c0b33720
Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 90 31 b3 c0 81 88 ff ff 80 32 05 85 ff ff ff ff <01> 00 00 00 00 00 00 00 08 3b b3 c0 81 88 ff ff 00 34 b3 c0 81 88
RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010206
RAX: ffffffff8154d3fa RBX: 0000000000000100 RCX: ffff88819f73cec0
RDX: 0000000000000100 RSI: ffff8881c0b33720 RDI: ffff8881c0b331c0
RBP: ffff8881f6f09ec8 R08: ffffffff8154d03e R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 0000000100042688
R13: dffffc0000000000 R14: ffff8881c0b33720 R15: ffff8881c0b331c0
FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff8881c0b33720 CR3: 00000001c07e1000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1800
__do_softirq+0x23b/0x6b7 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:373 [inline]
irq_exit+0x195/0x1c0 kernel/softirq.c:413
exiting_irq arch/x86/include/asm/apic.h:538 [inline]
smp_apic_timer_interrupt+0x11a/0x460 arch/x86/kernel/apic/apic.c:1149
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834
</IRQ>
Modules linked in:
CR2: ffff8881c0b33720
---[ end trace 81c9b0579ce46733 ]---
RIP: 0010:0xffff8881c0b33720
Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 90 31 b3 c0 81 88 ff ff 80 32 05 85 ff ff ff ff <01> 00 00 00 00 00 00 00 08 3b b3 c0 81 88 ff ff 00 34 b3 c0 81 88
RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010206
RAX: ffffffff8154d3fa RBX: 0000000000000100 RCX: ffff88819f73cec0
RDX: 0000000000000100 RSI: ffff8881c0b33720 RDI: ffff8881c0b331c0
RBP: ffff8881f6f09ec8 R08: ffffffff8154d03e R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 0000000100042688
R13: dffffc0000000000 R14: ffff8881c0b33720 R15: ffff8881c0b331c0
FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff8881c0b33720 CR3: 00000001c07e1000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400