audit: type=1400 audit(1519158550.659:6): avc: denied { map } for pid=4152 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1519158556.965:7): avc: denied { map } for pid=4166 comm="syzkaller784367" path="/root/syzkaller784367192" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 4177 Comm: syzkaller784367 Not tainted 4.16.0-rc2+ #234 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:ipt_do_table+0x12ee/0x1950 net/ipv4/netfilter/ip_tables.c:334 RSP: 0018:ffff8801db506360 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff8801af9d9048 RCX: ffffffff84b7907d RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffff8801af9d8e5a RBP: ffff8801db506568 R08: ffff8801db506660 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: dffffc0000000000 R14: ffff8801af9d8e00 R15: ffff8801db5064e0 FS: 00000000021bc880(0000) GS:ffff8801db500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000004a3c9e CR3: 00000001b1826005 CR4: 00000000001606e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: iptable_filter_hook+0x65/0x80 net/ipv4/netfilter/iptable_filter.c:41 nf_hook_entry_hookfn include/linux/netfilter.h:120 [inline] nf_hook_slow+0xba/0x1a0 net/netfilter/core.c:483 nf_hook include/linux/netfilter.h:243 [inline] NF_HOOK include/linux/netfilter.h:286 [inline] ip_local_deliver+0x445/0x6e0 net/ipv4/ip_input.c:257 dst_input include/net/dst.h:449 [inline] ip_rcv_finish+0xa36/0x2040 net/ipv4/ip_input.c:397 NF_HOOK include/linux/netfilter.h:288 [inline] ip_rcv+0xc5a/0x1840 net/ipv4/ip_input.c:493 __netif_receive_skb_core+0x1a41/0x3460 net/core/dev.c:4554 __netif_receive_skb+0x2c/0x1b0 net/core/dev.c:4619 netif_receive_skb_internal+0x10b/0x670 net/core/dev.c:4693 napi_skb_finish net/core/dev.c:5055 [inline] napi_gro_receive+0x3d0/0x500 net/core/dev.c:5086 receive_buf+0xb6e/0x2530 drivers/net/virtio_net.c:916 virtnet_receive drivers/net/virtio_net.c:1160 [inline] virtnet_poll+0x320/0xb70 drivers/net/virtio_net.c:1240 napi_poll net/core/dev.c:5697 [inline] net_rx_action+0x792/0x1910 net/core/dev.c:5763 __do_softirq+0x2d7/0xb85 kernel/softirq.c:285 invoke_softirq kernel/softirq.c:365 [inline] irq_exit+0x1cc/0x200 kernel/softirq.c:405 exiting_irq arch/x86/include/asm/apic.h:541 [inline] do_IRQ+0xeb/0x190 arch/x86/kernel/irq.c:250 common_interrupt+0x8e/0x8e arch/x86/entry/entry_64.S:576 RIP: 0010:on_stack arch/x86/include/asm/stacktrace.h:46 [inline] RIP: 0010:update_stack_state+0x1dc/0x700 arch/x86/kernel/unwind_frame.c:238 RSP: 0018:ffff8801cdb57358 EFLAGS: 00000287 ORIG_RAX: ffffffffffffffd5 RAX: 0000000000000001 RBX: ffff8801cdb579f0 RCX: ffff8801cdb58000 RDX: ffff8801cdb50000 RSI: ffff8801cdb57a00 RDI: ffff8801cdb575a0 RBP: ffff8801cdb57460 R08: ffff8801cdb575c8 R09: ffff8801b6532500 R10: 000000000000000b R11: ffffed0039b6aebc R12: 1ffff10039b6ae73 R13: ffffed0039b6aeb3 R14: dffffc0000000000 R15: ffff8801cdb57590 unwind_next_frame.part.6+0x1a6/0xb40 arch/x86/kernel/unwind_frame.c:329 unwind_next_frame+0x3e/0x50 arch/x86/kernel/unwind_frame.c:287 __save_stack_trace+0x6e/0xd0 arch/x86/kernel/stacktrace.c:44 save_stack_trace+0x1a/0x20 arch/x86/kernel/stacktrace.c:60 save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:552 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:489 kmem_cache_alloc+0x12e/0x760 mm/slab.c:3541 kmem_cache_zalloc include/linux/slab.h:691 [inline] inode_alloc_security security/selinux/hooks.c:234 [inline] selinux_inode_alloc_security+0xf9/0x390 security/selinux/hooks.c:2885 security_inode_alloc+0x90/0xd0 security/security.c:437 inode_init_always+0x653/0xca0 fs/inode.c:168 alloc_inode+0x82/0x180 fs/inode.c:216 new_inode_pseudo+0x69/0x190 fs/inode.c:890 sock_alloc+0x41/0x270 net/socket.c:564 __sock_create+0x148/0x850 net/socket.c:1249 sock_create net/socket.c:1325 [inline] SYSC_socket net/socket.c:1355 [inline] SyS_socket+0xeb/0x1d0 net/socket.c:1335 do_syscall_64+0x280/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x442339 RSP: 002b:00007ffdc9a5c988 EFLAGS: 00000207 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000442339 RDX: 0000000000000000 RSI: 0000000000000801 RDI: 000000000000000a RBP: 0000000000000003 R08: 000000a800000001 R09: 000000a800000001 R10: 00000000021bc880 R11: 0000000000000207 R12: 0000000000000000 R13: 00000000006ce428 R14: 0000000000000000 R15: 0000000000000000 Code: 46 52 02 75 41 e8 53 7b b9 fc 8b 85 80 fe ff ff 8d 70 01 89 b5 00 ff ff ff 48 8b b5 88 fe ff ff 4c 8d 24 c6 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 0f 85 e8 01 00 00 8b 85 00 ff ff ff 4d 89 34 24 RIP: ipt_do_table+0x12ee/0x1950 net/ipv4/netfilter/ip_tables.c:334 RSP: ffff8801db506360 ---[ end trace 4536231aa52d0f9c ]---