kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle page fault for address: ffff8881c0b33720 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0011) - permissions violation PGD 7801067 P4D 7801067 PUD 1e4573063 PMD 1daeb5063 PTE 80000001c0b33163 Oops: 0011 [#1] PREEMPT SMP KASAN CPU: 1 PID: 23056 Comm: syz-executor.5 Not tainted 5.4.249-syzkaller-00007-gba2c000ce64e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 RIP: 0010:0xffff8881c0b33720 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 90 31 b3 c0 81 88 ff ff 80 32 05 85 ff ff ff ff <01> 00 00 00 00 00 00 00 08 3b b3 c0 81 88 ff ff 00 34 b3 c0 81 88 RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010206 RAX: ffffffff8154d3fa RBX: 0000000000000100 RCX: ffff88819f73cec0 RDX: 0000000000000100 RSI: ffff8881c0b33720 RDI: ffff8881c0b331c0 RBP: ffff8881f6f09ec8 R08: ffffffff8154d03e R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 0000000100042688 R13: dffffc0000000000 R14: ffff8881c0b33720 R15: ffff8881c0b331c0 FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8881c0b33720 CR3: 00000001c07e1000 CR4: 00000000003406a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1800 __do_softirq+0x23b/0x6b7 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:373 [inline] irq_exit+0x195/0x1c0 kernel/softirq.c:413 exiting_irq arch/x86/include/asm/apic.h:538 [inline] smp_apic_timer_interrupt+0x11a/0x460 arch/x86/kernel/apic/apic.c:1149 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:834 Modules linked in: CR2: ffff8881c0b33720 ---[ end trace 81c9b0579ce46733 ]--- RIP: 0010:0xffff8881c0b33720 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 90 31 b3 c0 81 88 ff ff 80 32 05 85 ff ff ff ff <01> 00 00 00 00 00 00 00 08 3b b3 c0 81 88 ff ff 00 34 b3 c0 81 88 RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010206 RAX: ffffffff8154d3fa RBX: 0000000000000100 RCX: ffff88819f73cec0 RDX: 0000000000000100 RSI: ffff8881c0b33720 RDI: ffff8881c0b331c0 RBP: ffff8881f6f09ec8 R08: ffffffff8154d03e R09: 0000000000000003 R10: ffffffffffffffff R11: dffffc0000000001 R12: 0000000100042688 R13: dffffc0000000000 R14: ffff8881c0b33720 R15: ffff8881c0b331c0 FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff8881c0b33720 CR3: 00000001c07e1000 CR4: 00000000003406a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400