kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle page fault for address: ffff88801d74e6b0 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0011) - permissions violation PGD 19b8c067 P4D 19b8c067 PUD 19b8d067 PMD 800000001d6000e3 Oops: Oops: 0011 [#1] SMP KASAN PTI CPU: 1 UID: 0 PID: 29 Comm: ktimers/1 Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:0xffff88801d74e6b0 Code: 00 00 57 16 2f c5 44 e9 8d ea 18 4e 24 8b ff ff ff ff 78 08 da 5f 80 88 ff ff 00 00 00 00 00 00 00 00 3b 00 0c 00 00 00 00 00 98 d0 aa a6 9e 85 03 cc d5 87 81 ff ff ff ff 80 d7 dc 8d ff ff RSP: 0018:ffffc90000a3fa38 EFLAGS: 00010246 RAX: ffffffff81b0a988 RBX: 0000000080000000 RCX: ffff88801d2bbc80 RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffffc9000153ee80 RBP: ffffc90000a3fb30 R08: 0000000000000000 R09: 0000000000000100 R10: dffffc0000000000 R11: ffff88801d74e6b0 R12: 0000000000000001 R13: 00000000ffffaa00 R14: 1ffff92000147f4c R15: ffffc9000153ee80 FS: 0000000000000000(0000) GS:ffff888126440000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88801d74e6b0 CR3: 000000003730e000 CR4: 00000000003526f0 Call Trace: expire_timers kernel/time/timer.c:1799 [inline] __run_timers kernel/time/timer.c:2373 [inline] __run_timer_base+0x6a3/0x9f0 kernel/time/timer.c:2385 run_timer_base kernel/time/timer.c:2394 [inline] run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2404 handle_softirqs+0x1de/0x6f0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] run_ktimerd+0x69/0x100 kernel/softirq.c:1138 smpboot_thread_fn+0x541/0xa50 kernel/smpboot.c:160 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: CR2: ffff88801d74e6b0 ---[ end trace 0000000000000000 ]--- RIP: 0010:0xffff88801d74e6b0 Code: 00 00 57 16 2f c5 44 e9 8d ea 18 4e 24 8b ff ff ff ff 78 08 da 5f 80 88 ff ff 00 00 00 00 00 00 00 00 3b 00 0c 00 00 00 00 00 98 d0 aa a6 9e 85 03 cc d5 87 81 ff ff ff ff 80 d7 dc 8d ff ff RSP: 0018:ffffc90000a3fa38 EFLAGS: 00010246 RAX: ffffffff81b0a988 RBX: 0000000080000000 RCX: ffff88801d2bbc80 RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffffc9000153ee80 RBP: ffffc90000a3fb30 R08: 0000000000000000 R09: 0000000000000100 R10: dffffc0000000000 R11: ffff88801d74e6b0 R12: 0000000000000001 R13: 00000000ffffaa00 R14: 1ffff92000147f4c R15: ffffc9000153ee80 FS: 0000000000000000(0000) GS:ffff888126440000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88801d74e6b0 CR3: 000000003730e000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 57 push %rdi 3: 16 (bad) 4: 2f (bad) 5: c5 44 e9 (bad) 8: 8d lea (bad),%ebp 9: ea (bad) a: 18 4e 24 sbb %cl,0x24(%rsi) d: 8b ff mov %edi,%edi f: ff (bad) 10: ff (bad) 11: ff (bad) 12: 78 08 js 0x1c 14: da 5f 80 ficompl -0x80(%rdi) 17: 88 ff mov %bh,%bh 19: ff 00 incl (%rax) 1b: 00 00 add %al,(%rax) 1d: 00 00 add %al,(%rax) 1f: 00 00 add %al,(%rax) 21: 00 3b add %bh,(%rbx) 23: 00 0c 00 add %cl,(%rax,%rax,1) 26: 00 00 add %al,(%rax) 28: 00 00 add %al,(%rax) * 2a: bd 98 d0 aa a6 mov $0xa6aad098,%ebp <-- trapping instruction 2f: 9e sahf 30: 85 03 test %eax,(%rbx) 32: cc int3 33: d5 87 81 (bad) 36: ff (bad) 37: ff (bad) 38: ff (bad) 39: ff 80 d7 dc 8d ff incl -0x722329(%rax) 3f: ff .byte 0xff