kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory accessgeneral protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 16487 Comm: syz-executor.0 Not tainted 4.4.174+ #4 task: ffff8801d40817c0 task.stack: ffff8801b5260000 RIP: 0010:[] [ 730.720364] audit_printk_skb: 99 callbacks suppressed audit: type=1400 audit(1574278340.516:531): avc: denied { create } for pid=16491 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 nla_parse: 4 callbacks suppressed netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. audit: type=1400 audit(1574278340.516:532): avc: denied { create } for pid=16491 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 audit: type=1400 audit(1574278340.516:533): avc: denied { create } for pid=16500 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 audit: type=1400 audit(1574278340.516:534): avc: denied { create } for pid=16500 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. audit: type=1400 audit(1574278340.516:535): avc: denied { create } for pid=16500 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 audit: type=1400 audit(1574278340.516:536): avc: denied { create } for pid=16500 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65280 sclass=netlink_xfrm_socket audit: type=1400 audit(1574278340.516:537): avc: denied { create } for pid=16508 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65280 sclass=netlink_xfrm_socket audit: type=1400 audit(1574278340.516:538): avc: denied { create } for pid=16508 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. audit: type=1400 audit(1574278340.516:539): avc: denied { create } for pid=16515 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 netlink: 104 bytes leftover after parsing attributes in process `syz-executor.1'. audit: type=1400 audit(1574278340.516:540): avc: denied { create } for pid=16515 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [] __xfrm_policy_check2 include/net/xfrm.h:1070 [inline] [] xfrm_policy_check include/net/xfrm.h:1076 [inline] [] xfrm4_policy_check include/net/xfrm.h:1081 [inline] [] udp_queue_rcv_skb+0x18d/0x14e0 net/ipv4/udp.c:1520 RSP: 0018:ffff8801b5267838 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffc90000d43000 RDX: 000000000000000c RSI: ffffffff824813a4 RDI: 0000000000000060 RBP: ffff8801b5267878 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8800b5475c00 R13: ffff8801b5a74dc0 R14: 0000000000000000 R15: ffff8801b5a74e18 FS: 00007f0f2182b700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000004eab00 CR3: 00000000b6783000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffff8800b5475c00 ffff880000000001 ffff8800b5475c88 ffff8800b5475c00 ffff8801b5a74dc0 dffffc0000000000 ffff8800b5475c88 0000000000000000 ffff8801b52678e8 ffffffff821e5e40 ffff8800b5476030 ffff8800b5475d88 Call Trace: [] sk_backlog_rcv include/net/sock.h:875 [inline] [] __release_sock net/core/sock.c:2024 [inline] [] release_sock+0x170/0x500 net/core/sock.c:2477 [] udp_sendmsg+0x1176/0x1c60 net/ipv4/udp.c:1107 [] inet_sendmsg+0x202/0x4d0 net/ipv4/af_inet.c:755 [] sock_sendmsg_nosec net/socket.c:638 [inline] [] sock_sendmsg+0xbe/0x110 net/socket.c:648 [] ___sys_sendmsg+0x769/0x890 net/socket.c:1975 [] __sys_sendmsg+0xc5/0x160 net/socket.c:2009 [] SYSC_sendmsg net/socket.c:2020 [inline] [] SyS_sendmsg+0x2d/0x50 net/socket.c:2016 [] entry_SYSCALL_64_fastpath+0x1e/0x9a Code: 8b 75 58 41 f6 c6 01 0f 85 f9 07 00 00 e8 4c 82 e8 fe 49 83 e6 fe 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 60 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 01 0f 8e 6a 0e 00 00 41 f6 46 60 04 RIP [] __xfrm_policy_check2 include/net/xfrm.h:1070 [inline] RIP [] xfrm_policy_check include/net/xfrm.h:1076 [inline] RIP [] xfrm4_policy_check include/net/xfrm.h:1081 [inline] RIP [] udp_queue_rcv_skb+0x18d/0x14e0 net/ipv4/udp.c:1520 RSP ---[ end trace 13ab1cca9a4f9d88 ]---