kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 30364 Comm: syz-executor.1 Not tainted 4.9.205-syzkaller #0 task: 00000000bff2f7a4 task.stack: 0000000071a84058 RIP: 0010:[] [<0000000061029933>] addrconf_rt_table+0x127/0x290 net/ipv6/addrconf.c:2226 RSP: 0018:ffff8801d098f3c8 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: ffff8801ac520000 RCX: 0000000000000001 RDX: 0000000000000056 RSI: 0000000000000000 RDI: 00000000000002b0 RBP: ffff8801d098f3f8 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000001 R12: 00000000000000fe R13: 0000000000000200 R14: 0000000000000000 R15: ffff8801ab189ec0 FS: 00007fdb9cdc2700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f6d1e911db8 CR3: 00000001d4d44000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 audit: type=1400 audit(2000000101.710:1269): avc: denied { syslog } for pid=3336 comm="syz-executor.0" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 Stack: ffffffff826c4ae0 ffff8801cac81400 ffff8801ac520000 0000000000000000 0000000000000080 ffff8801ab189ec0 ffff8801d098f440 ffffffff826c59f4 0000000000000000 ffff8801cac81590 ffff8801cac81400 ffff8801cac81590 Call Trace: [<00000000b968642e>] addrconf_get_prefix_route+0x34/0x270 net/ipv6/addrconf.c:2280 [<0000000088af7876>] __ipv6_ifa_notify+0x642/0x880 net/ipv6/addrconf.c:5520 [<000000004a731a2d>] addrconf_ifdown+0xa89/0x14d0 net/ipv6/addrconf.c:3692 [<00000000c7d92032>] addrconf_notify+0x7ac/0x1f50 net/ipv6/addrconf.c:3496 [<00000000d45f3773>] notifier_call_chain+0xb4/0x1d0 kernel/notifier.c:93 [<000000007b86beaf>] __raw_notifier_call_chain kernel/notifier.c:394 [inline] [<000000007b86beaf>] raw_notifier_call_chain+0x2e/0x40 kernel/notifier.c:401 [<00000000192cb6bf>] call_netdevice_notifiers_info+0x56/0x70 net/core/dev.c:1647 [<00000000aaaba31b>] call_netdevice_notifiers net/core/dev.c:1663 [inline] [<00000000aaaba31b>] rollback_registered_many+0x6ef/0xb50 net/core/dev.c:6863 [<000000009b6ab061>] rollback_registered+0xf2/0x1b0 net/core/dev.c:6904 [<000000003401a923>] unregister_netdevice_queue net/core/dev.c:7893 [inline] [<000000003401a923>] unregister_netdevice_queue+0x1ae/0x230 net/core/dev.c:7886 [<00000000240f5158>] unregister_netdevice include/linux/netdevice.h:2468 [inline] [<00000000240f5158>] __tun_detach+0x820/0xa00 drivers/net/tun.c:575 [<000000006532ed13>] tun_detach drivers/net/tun.c:585 [inline] [<000000006532ed13>] tun_chr_close+0x46/0x60 drivers/net/tun.c:2396 [<00000000a7010449>] __fput+0x274/0x720 fs/file_table.c:208 [<00000000fc594f5a>] ____fput+0x16/0x20 fs/file_table.c:244 [<00000000b213a44e>] task_work_run+0x108/0x180 kernel/task_work.c:116 [<00000000f042638f>] exit_task_work include/linux/task_work.h:21 [inline] [<00000000f042638f>] do_exit+0x78f/0x2aa0 kernel/exit.c:842 [<000000008b708bbb>] do_group_exit+0x111/0x300 kernel/exit.c:946 [<0000000020f0c2a1>] get_signal+0x377/0x1cb0 kernel/signal.c:2399 [<00000000a37f18a1>] do_signal+0x9c/0x1920 arch/x86/kernel/signal.c:812 [<00000000e75877c2>] exit_to_usermode_loop+0x11c/0x160 arch/x86/entry/common.c:159 [<00000000adf43712>] prepare_exit_to_usermode arch/x86/entry/common.c:195 [inline] [<00000000adf43712>] syscall_return_slowpath arch/x86/entry/common.c:266 [inline] [<00000000adf43712>] do_syscall_64+0x3ab/0x5c0 arch/x86/entry/common.c:293 [<00000000c79f8bf0>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: 6c 82 be 01 00 00 00 48 c7 c7 e0 59 0d 83 e8 81 da b4 fe 49 8d be b0 02 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 35 01 00 00 45 8b be b0 02 RIP [<0000000061029933>] addrconf_rt_table+0x127/0x290 net/ipv6/addrconf.c:2226 RSP ---[ end trace 2c9659854bfd65ef ]---