==================================================================
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Dumping ftrace buffer:
(ftrace buffer empty)
Modules linked in:
CPU: 0 PID: 16509 Comm: syz-executor7 Not tainted 4.9.97-g1321d42 #13
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8801ba794800 task.stack: ffff8801bb278000
RIP: 0010:[<ffffffff81d0ec0e>] [<ffffffff81d0ec0e>] sock_has_perm+0x1fe/0x3e0 security/selinux/hooks.c:4248
RSP: 0018:ffff8801bb27f7e0 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 1ffff1003764feff RCX: ffff8801ba794800
RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000010
RBP: ffff8801bb27f8e0 R08: ffff8801ba7950e8 R09: 0000000000000001
R10: 0000000000000000 R11: 0000000000000001 R12: ffff8801bb27f8b8
R13: 0000000000000000 R14: ffff8801cf698880 R15: 0000000000000001
FS: 00007f7268463700(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f55d56bf169 CR3: 00000001da202000 CR4: 00000000001606f0
DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Stack:
ffffffff81d0eaaf ffff8801bb27f858 000000028157475b 0000000041b58ab3
ffffffff843dc8fe ffffffff81d0ea10 00007ffffffff000 00000000d9432880
0000000020002c1b ffff8801bb27fdb8 ffff8801bb27f9e0 1ffff1003764ff10
Call Trace:
[<ffffffff81d0ef3f>] selinux_socket_recvmsg+0x3f/0x50 security/selinux/hooks.c:4508
[<ffffffff81cf05eb>] security_socket_recvmsg+0x8b/0xc0 security/security.c:1289
[<ffffffff8301244b>] sock_recvmsg+0x4b/0x110 net/socket.c:742
[<ffffffff83014df2>] ___sys_recvmsg+0x242/0x550 net/socket.c:2128
[<ffffffff8301744d>] __sys_recvmmsg+0x25d/0x700 net/socket.c:2236
[<ffffffff830179db>] SYSC_recvmmsg net/socket.c:2317 [inline]
[<ffffffff830179db>] SyS_recvmmsg+0xeb/0x1c0 net/socket.c:2301
[<ffffffff81006316>] do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282
[<ffffffff839f4653>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb
Code: c2 d2 eb d0 81 be 01 00 00 00 48 c7 c7 20 ef 6d 84 e8 17 a5 52 ff 49 8d 7d 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8b 01 00 00 41 8b 75 10 31
RIP [<ffffffff81d0ec0e>] sock_has_perm+0x1fe/0x3e0 security/selinux/hooks.c:4248
RSP <ffff8801bb27f7e0>
---[ end trace ee7ef3ea1fbf2449 ]---