audit: type=1400 audit(1574867239.925:130): avc: denied { write } for pid=8310 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 6398 Comm: syz-executor.4 Not tainted 4.9.203-syzkaller #0 task: 00000000817b09f0 task.stack: 00000000c16b7d8b RIP: 0010:[] [<000000005e99ebed>] addrconf_rt_table+0x127/0x290 net/ipv6/addrconf.c:2226 RSP: 0018:ffff8801ae20f3c8 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: ffff8801d4910000 RCX: 0000000000000001 RDX: 0000000000000056 RSI: 0000000000000000 RDI: 00000000000002b0 RBP: ffff8801ae20f3f8 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000001 R12: 00000000000000fe R13: 0000000000000200 R14: 0000000000000000 R15: ffff8801a574dc40 FS: 00007f41ea3ce700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c42af29000 CR3: 00000001c5fe0000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Stack: ffffffff826c4bd0 ffff8801d650a780 ffff8801d4910000 0000000000000000 0000000000000080 ffff8801a574dc40 ffff8801ae20f440 ffffffff826c5ae4 0000000000000000 ffff8801d650a910 ffff8801d650a780 ffff8801d650a910 Call Trace: [<00000000b37faf05>] addrconf_get_prefix_route+0x34/0x270 net/ipv6/addrconf.c:2280 [<000000008965ca36>] __ipv6_ifa_notify+0x642/0x880 net/ipv6/addrconf.c:5520 [<00000000a6223932>] addrconf_ifdown+0xa89/0x14d0 net/ipv6/addrconf.c:3692 [<0000000050157630>] addrconf_notify+0x7ac/0x1f50 net/ipv6/addrconf.c:3496 [<00000000b45c0c93>] notifier_call_chain+0xb4/0x1d0 kernel/notifier.c:93 [<0000000068b4e1ac>] __raw_notifier_call_chain kernel/notifier.c:394 [inline] [<0000000068b4e1ac>] raw_notifier_call_chain+0x2e/0x40 kernel/notifier.c:401 [<00000000e00df91f>] call_netdevice_notifiers_info+0x56/0x70 net/core/dev.c:1647 [<0000000091a5af85>] call_netdevice_notifiers net/core/dev.c:1663 [inline] [<0000000091a5af85>] rollback_registered_many+0x6ef/0xb50 net/core/dev.c:6863 [<00000000d0bfe072>] rollback_registered+0xf2/0x1b0 net/core/dev.c:6904 [<00000000e7247f64>] unregister_netdevice_queue net/core/dev.c:7893 [inline] [<00000000e7247f64>] unregister_netdevice_queue+0x1ae/0x230 net/core/dev.c:7886 [<0000000090ec049a>] unregister_netdevice include/linux/netdevice.h:2468 [inline] [<0000000090ec049a>] __tun_detach+0x820/0xa00 drivers/net/tun.c:575 [<000000009fd6bb4c>] tun_detach drivers/net/tun.c:585 [inline] [<000000009fd6bb4c>] tun_chr_close+0x46/0x60 drivers/net/tun.c:2396 [<000000009f0a430f>] __fput+0x274/0x720 fs/file_table.c:208 [<00000000e8aeb0a9>] ____fput+0x16/0x20 fs/file_table.c:244 [<00000000f4e6eb8f>] task_work_run+0x108/0x180 kernel/task_work.c:116 [<00000000bba161f2>] exit_task_work include/linux/task_work.h:21 [inline] [<00000000bba161f2>] do_exit+0x78f/0x2aa0 kernel/exit.c:842 [<00000000d67376af>] do_group_exit+0x111/0x300 kernel/exit.c:946 [<00000000356a69f4>] get_signal+0x377/0x1cb0 kernel/signal.c:2399 [<000000001aab150a>] do_signal+0x9c/0x1920 arch/x86/kernel/signal.c:812 [<000000000722508b>] exit_to_usermode_loop+0x11c/0x160 arch/x86/entry/common.c:159 [<000000000c89f8c9>] prepare_exit_to_usermode arch/x86/entry/common.c:195 [inline] [<000000000c89f8c9>] syscall_return_slowpath arch/x86/entry/common.c:266 [inline] [<000000000c89f8c9>] do_syscall_64+0x3ab/0x5c0 arch/x86/entry/common.c:293 [<000000004b9aa26e>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: 6c 82 be 01 00 00 00 48 c7 c7 e0 59 0d 83 e8 91 d9 b4 fe 49 8d be b0 02 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 35 01 00 00 45 8b be b0 02 RIP [<000000005e99ebed>] addrconf_rt_table+0x127/0x290 net/ipv6/addrconf.c:2226 RSP ---[ end trace 1dce892c240ed37b ]---