audit: type=1400 audit(1519133320.304:21): avc: denied { create } for pid=5429 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 5439 Comm: syz-executor7 Not tainted 4.16.0-rc2+ #234 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:ip6t_do_table+0x132d/0x1a30 net/ipv6/netfilter/ip6_tables.c:355 RSP: 0018:ffff8801cd25f000 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff8801aa1b2248 RCX: ffffffff84dc2b41 RDX: 000000000000049f RSI: 0000000000000000 RDI: ffff8801aa1b20ce RBP: ffff8801cd25f248 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000000 R14: dffffc0000000000 R15: ffff8801aa1b2040 FS: 00007f0a6f72f700(0000) GS:ffff8801db500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b9bc22000 CR3: 00000001c81f3006 CR4: 00000000001606e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ip6table_filter_hook+0x65/0x80 net/ipv6/netfilter/ip6table_filter.c:41 nf_hook_entry_hookfn include/linux/netfilter.h:120 [inline] nf_hook_slow+0xba/0x1a0 net/netfilter/core.c:483 nf_hook include/linux/netfilter.h:243 [inline] __ip6_local_out+0x517/0xaa0 net/ipv6/output_core.c:164 ip6_local_out+0x2d/0x160 net/ipv6/output_core.c:174 ip6_send_skb+0xa1/0x330 net/ipv6/ip6_output.c:1677 ip6_push_pending_frames+0xb3/0xe0 net/ipv6/ip6_output.c:1697 rawv6_push_pending_frames net/ipv6/raw.c:616 [inline] rawv6_sendmsg+0x2f96/0x40c0 net/ipv6/raw.c:935 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:763 sock_sendmsg_nosec net/socket.c:629 [inline] sock_sendmsg+0xca/0x110 net/socket.c:639 ___sys_sendmsg+0x767/0x8b0 net/socket.c:2047 __sys_sendmsg+0xe5/0x210 net/socket.c:2081 SYSC_sendmsg net/socket.c:2092 [inline] SyS_sendmsg+0x2d/0x50 net/socket.c:2088 do_syscall_64+0x280/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x453da9 RSP: 002b:00007f0a6f72ec68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f0a6f72f6d4 RCX: 0000000000453da9 RDX: 0000000000000000 RSI: 0000000020008fc8 RDI: 0000000000000014 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff kasan: CONFIG_KASAN_INLINE enabled R13: 00000000000004a6 R14: 00000000006f7030 R15: 0000000000000000 Code: kasan: GPF could be caused by NULL-ptr deref or user memory access 41 f6 87 83 00 00 00 04 75 37 e8 8f e0 94 fc 8b 85 14 fe ff ff 48 8b b5 50 fe ff ff 4c 8d 2c c6 44 8d 60 01 4c 89 e8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 26 03 00 00 4d 89 7d 00 44 89 a5 14 fe ff RIP: ip6t_do_table+0x132d/0x1a30 net/ipv6/netfilter/ip6_tables.c:355 RSP: ffff8801cd25f000 general protection fault: 0000 [#2] SMP KASAN ---[ end trace 283839545bfa6b08 ]--- Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: