kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
BUG: unable to handle page fault for address: ffff8881f6f09e28
#PF: supervisor instruction fetch in kernel mode
#PF: error_code(0x0011) - permissions violation
PGD 7801067 P4D 7801067 PUD 1e455c063 PMD 80000001f6e001e3
Oops: 0011 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 30757 Comm: syz-executor.3 Not tainted 5.4.259-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
RIP: 0010:0xffff8881f6f09e28
Code: ff 1f a0 34 01 00 01 00 00 00 58 e0 e8 86 ff ff ff ff 48 e0 e8 86 ff ff ff ff 5f 5d 31 82 ff ff ff ff a0 7c de f5 81 88 ff ff <d0> 31 73 bf 81 88 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010206
RAX: ffffffff8154e1aa RBX: 0000000000000100 RCX: ffff8881e4a31f80
RDX: 0000000000000100 RSI: ffff8881f6f09e28 RDI: ffff8881bf7331c0
RBP: ffff8881f6f09ec8 R08: ffffffff8154ddee R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000001000134a0
R13: dffffc0000000000 R14: ffff8881f6f09e28 R15: ffff8881bf7331c0
FS: 00007fb33731c6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff8881f6f09e28 CR3: 00000001daab9000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
<IRQ>
run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1800
__do_softirq+0x23b/0x6b7 kernel/softirq.c:292
invoke_softirq kernel/softirq.c:373 [inline]
irq_exit+0x195/0x1c0 kernel/softirq.c:413
exiting_irq arch/x86/include/asm/apic.h:538 [inline]
smp_apic_timer_interrupt+0x11a/0x460 arch/x86/kernel/apic/apic.c:1149
apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834
</IRQ>
Modules linked in:
CR2: ffff8881f6f09e28
---[ end trace b4ae256745ca551b ]---
RIP: 0010:0xffff8881f6f09e28
Code: ff 1f a0 34 01 00 01 00 00 00 58 e0 e8 86 ff ff ff ff 48 e0 e8 86 ff ff ff ff 5f 5d 31 82 ff ff ff ff a0 7c de f5 81 88 ff ff <d0> 31 73 bf 81 88 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010206
RAX: ffffffff8154e1aa RBX: 0000000000000100 RCX: ffff8881e4a31f80
RDX: 0000000000000100 RSI: ffff8881f6f09e28 RDI: ffff8881bf7331c0
RBP: ffff8881f6f09ec8 R08: ffffffff8154ddee R09: 0000000000000003
R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000001000134a0
R13: dffffc0000000000 R14: ffff8881f6f09e28 R15: ffff8881bf7331c0
FS: 00007fb33731c6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff8881f6f09e28 CR3: 00000001daab9000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600