kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory accessgeneral protection fault: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 18879 Comm: syz-executor7 Not tainted 4.4.106-g1700518 #9 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8800b2e82f80 task.stack: ffff8800b3700000 RIP: 0010:[] [] __list_del_entry+0x86/0x1d0 lib/list_debug.c:57 RSP: 0018:ffff8800b37075a8 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff8801c7c57390 RDX: 0000000000000000 RSI: ffffffff855230c0 RDI: ffff8801c7c57398 RBP: ffff8800b37075c0 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 1ffff100166e0e84 R12: 0000000000000000 R13: ffff8801c7c57339 R14: ffff8801c7c573b8 R15: 00000000ffffffde FS: 00007f6e51846700(0000) GS:ffff8801db500000(0000) knlGS:0000000000000000 audit: type=1400 audit(1513694216.435:38): avc: denied { setopt } for pid=18895 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 audit: type=1400 audit(1513694216.435:39): avc: denied { ioctl } for pid=18895 comm="syz-executor0" path="socket:[30871]" dev="sockfs" ino=30871 ioctlcmd=8904 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000002000ef86 CR3: 00000001d86a9000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffff8801c7c573b8 ffff8801c7c57390 ffff8800b17073c0 ffff8800b37075d8 ffffffff81d62d0d ffff8801c7c57390 ffff8800b37075f8 ffffffff832ab16e ffff8800abf21100 ffff8801c7c57390 ffff8800b3707618 ffffffff832ca6b3 Call Trace: [] list_del+0xd/0x70 lib/list_debug.c:77 [] xfrm_state_walk_done+0x6e/0xa0 net/xfrm/xfrm_state.c:1675 [] xfrm_dump_sa_done+0x73/0xa0 net/xfrm/xfrm_user.c:913 [] netlink_dump+0x871/0xb40 net/netlink/af_netlink.c:2158 [] __netlink_dump_start+0x52e/0x7c0 net/netlink/af_netlink.c:2223 [] netlink_dump_start include/linux/netlink.h:175 [inline] [] xfrm_user_rcv_msg+0x5bd/0x6b0 net/xfrm/xfrm_user.c:2512 [] netlink_rcv_skb+0x13e/0x370 net/netlink/af_netlink.c:2305 [] xfrm_netlink_rcv+0x6f/0x90 net/xfrm/xfrm_user.c:2533 [] netlink_unicast_kernel net/netlink/af_netlink.c:1223 [inline] [] netlink_unicast+0x522/0x760 net/netlink/af_netlink.c:1249 [] netlink_sendmsg+0x8e8/0xc50 net/netlink/af_netlink.c:1803 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:635 [] ___sys_sendmsg+0x6c1/0x7c0 net/socket.c:1961 [] __sys_sendmsg+0xd3/0x190 net/socket.c:1995 [] SYSC_sendmsg net/socket.c:2006 [inline] [] SyS_sendmsg+0x2d/0x50 net/socket.c:2002 [] entry_SYSCALL_64_fastpath+0x16/0x76 Code: c4 0f 84 94 00 00 00 48 b8 00 02 00 00 00 00 ad de 48 39 c3 0f 84 a5 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 e8 00 00 00 4c 8b 03 49 39 c8 0f 85 9b 00 00 RIP [] __list_del_entry+0x86/0x1d0 lib/list_debug.c:57 RSP ---[ end trace 75e3b6183aaf1e53 ]---