kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle kernel paging request at ffff88809164ee98 #PF error: [PROT] [INSTR] PGD b201067 P4D b201067 PUD 21ffff067 PMD 8d7a8063 PTE 800000009164e163 Oops: 0011 [#1] PREEMPT SMP KASAN CPU: 0 PID: 11075 Comm: syz-executor.3 Not tainted 5.1.0-rc4+ #167 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:0xffff88809164ee98 Code: ff ff 50 0c 10 86 ff ff ff ff 01 00 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 0f 02 00 01 00 00 00 00 00 00 00 00 00 00 00 28 99 01 00 ea ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffff888084e075d0 EFLAGS: 00010246 RAX: ffff88809164ee98 RBX: ffff888088281bb0 RCX: ffffc90010870000 RDX: 1ffff1101105037b RSI: ffffffff86104598 RDI: ffff888066723040 RBP: ffff888084e07600 R08: ffff88805f01c280 R09: ffffed1015d05bc8 R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffff888066723040 R13: 0000000000000001 R14: ffff888066723098 R15: 0000000000000000 FS: 00007f4d4ebbb700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88809164ee98 CR3: 00000000a6019000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: NF_HOOK include/linux/netfilter.h:289 [inline] NF_HOOK include/linux/netfilter.h:283 [inline] ipv6_rcv+0x10e/0x420 net/ipv6/ip6_input.c:272 __netif_receive_skb_one_core+0x115/0x1a0 net/core/dev.c:4987 __netif_receive_skb+0x2c/0x1c0 net/core/dev.c:5099 netif_receive_skb_internal+0x117/0x660 net/core/dev.c:5202 napi_frags_finish net/core/dev.c:5769 [inline] napi_gro_frags+0xade/0xd10 net/core/dev.c:5843 tun_get_user+0x2f24/0x3fb0 drivers/net/tun.c:1981 tun_chr_write_iter+0xbd/0x156 drivers/net/tun.c:2027 call_write_iter include/linux/fs.h:1866 [inline] do_iter_readv_writev+0x5e1/0x8e0 fs/read_write.c:681 do_iter_write fs/read_write.c:957 [inline] do_iter_write+0x184/0x610 fs/read_write.c:938 vfs_writev+0x1b3/0x2f0 fs/read_write.c:1002 do_writev+0x15e/0x370 fs/read_write.c:1037 __do_sys_writev fs/read_write.c:1110 [inline] __se_sys_writev fs/read_write.c:1107 [inline] __x64_sys_writev+0x75/0xb0 fs/read_write.c:1107 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x458ae1 Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b9 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007f4d4ebbaba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 0000000000000066 RCX: 0000000000458ae1 RDX: 0000000000000001 RSI: 00007f4d4ebbac00 RDI: 00000000000000f0 RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 00007f4d4ebbb6d4 R13: 00000000004c7523 R14: 00000000004dd490 R15: 00000000ffffffff Modules linked in: CR2: ffff88809164ee98 ---[ end trace ea563657f4d3801f ]--- RIP: 0010:0xffff88809164ee98 Code: ff ff 50 0c 10 86 ff ff ff ff 01 00 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 0f 02 00 01 00 00 00 00 00 00 00 00 00 00 00 28 99 01 00 ea ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffff888084e075d0 EFLAGS: 00010246 RAX: ffff88809164ee98 RBX: ffff888088281bb0 RCX: ffffc90010870000 RDX: 1ffff1101105037b RSI: ffffffff86104598 RDI: ffff888066723040 RBP: ffff888084e07600 R08: ffff88805f01c280 R09: ffffed1015d05bc8 R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffff888066723040 R13: 0000000000000001 R14: ffff888066723098 R15: 0000000000000000 FS: 00007f4d4ebbb700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88809164ee98 CR3: 00000000a6019000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400