device syz0 entered promiscuous mode audit: type=1400 audit(1515254225.856:10): avc: denied { net_raw } for pid=3467 comm="syzkaller843163" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1515254225.857:11): avc: denied { net_admin } for pid=3467 comm="syzkaller843163" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 3467 Comm: syzkaller843163 Not tainted 4.15.0-rc6-next-20180105+ #89 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:skb_segment+0x645/0x2ed0 net/core/skbuff.c:3567 RSP: 0018:ffff8801c066f0d0 EFLAGS: 00010202 RAX: 0000000000000010 RBX: 0000000000000000 RCX: ffffffff83c69e60 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 RBP: ffff8801c066f2b0 R08: 0000000000000020 R09: 0000000000000002 R10: ffff8801c066f368 R11: 0000000000000001 R12: ffff8801c8c5f840 R13: 0000000000000000 R14: ffff8801c15eed00 R15: dffffc0000000000 FS: 0000000002373880(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020b13000 CR3: 00000001c22da001 CR4: 00000000001606f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: sctp_gso_segment+0x21f/0x810 net/sctp/offload.c:72 inet_gso_segment+0x52f/0xff0 net/ipv4/af_inet.c:1288 skb_mac_gso_segment+0x27c/0x560 net/core/dev.c:2760 __skb_gso_segment+0x311/0x670 net/core/dev.c:2833 skb_gso_segment include/linux/netdevice.h:3998 [inline] validate_xmit_skb+0x447/0x980 net/core/dev.c:3086 validate_xmit_skb_list+0xbf/0x120 net/core/dev.c:3136 sch_direct_xmit+0x21c/0xf70 net/sched/sch_generic.c:312 qdisc_restart net/sched/sch_generic.c:393 [inline] __qdisc_run+0x42d/0x1630 net/sched/sch_generic.c:401 __dev_xmit_skb net/core/dev.c:3200 [inline] __dev_queue_xmit+0x9a1/0x2300 net/core/dev.c:3501 dev_queue_xmit+0x17/0x20 net/core/dev.c:3566 packet_snd net/packet/af_packet.c:2944 [inline] packet_sendmsg+0x31d5/0x5720 net/packet/af_packet.c:2969 sock_sendmsg_nosec net/socket.c:628 [inline] sock_sendmsg+0xca/0x110 net/socket.c:638 sock_write_iter+0x21d/0x3a0 net/socket.c:907 call_write_iter include/linux/fs.h:1775 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x550/0x740 fs/read_write.c:482 vfs_write+0x189/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xd4/0x1a0 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x444c09 RSP: 002b:00000000007eff48 EFLAGS: 00000297 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007ffceb064540 RCX: 0000000000444c09 RDX: 000000000000002a RSI: 0000000020634000 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000100 R11: 0000000000000297 R12: 0000000000402800 R13: 0000000000402890 R14: 0000000000000000 R15: 0000000000000000 Code: b5 e8 fe ff ff 39 b5 ec fe ff ff 0f 8f a3 00 00 00 e8 d0 70 97 fd 48 8b 85 00 ff ff ff 48 8d b8 80 00 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 14 38 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f RIP: skb_segment+0x645/0x2ed0 net/core/skbuff.c:3567 RSP: ffff8801c066f0d0 ---[ end trace be65b31d2bd611b0 ]---