keychord: Insufficient bytes present for keycount 30 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: binder: 12370:12372 ioctl 8924 20002000 returned -22 binder: 12370:12372 ERROR: BC_REGISTER_LOOPER called without request (ftrace buffer empty) Modules linked in: CPU: 0 PID: 12360 Comm: syz-executor0 Not tainted 4.9.67-gf26d3c7 #106 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 binder_alloc: 12370: binder_alloc_buf size 68719476736 failed, no address space binder_alloc: allocated: 0 (num: 0 largest: 0), free: 8192 (num: 1 largest: 8192) binder: 12370:12378 transaction failed 29201/-28, size 68719476736-0 line 3130 netlink: 11 bytes leftover after parsing attributes in process `syz-executor4'. task: ffff8801d5604800 task.stack: ffff8801d68c8000 binder: 12370:12378 ioctl 8924 20002000 returned -22 binder: BINDER_SET_CONTEXT_MGR already set binder: 12370:12389 ioctl 40046207 0 returned -16 binder: 12370:12378 ERROR: BC_REGISTER_LOOPER called without request binder_alloc: 12370: binder_alloc_buf, no vma binder: 12370:12389 transaction failed 29189/-3, size 68719476736-0 line 3130 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29201 RIP: 0010:[] [] sidtab_search_core+0x6a/0x320 security/selinux/ss/sidtab.c:94 RSP: 0018:ffff8801d68cf490 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000000008 RCX: ffffc900021d8000 RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffffffff8593e620 RBP: ffff8801d68cf4c0 R08: ffffffff85393c10 R09: ffffffff83a5e040 R10: 0000000000000001 R11: ffff8801d5604800 R12: 0000000000000001 R13: 0000000000000001 R14: 0000000000000000 R15: ffff8801ce72a270 FS: 00007f450a234700(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000002017f000 CR3: 00000001a8caa000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: 0000000000000001 ffffffff8593e620 0000000000000001 0000000000000001 0000000000000001 ffff8801ce72a270 ffff8801d68cf4e0 ffffffff81c0582f dffffc0000000000 ffff8801ce72a274 ffff8801d68cf608 ffffffff81c23952 Call Trace: [] sidtab_search+0x1f/0x30 security/selinux/ss/sidtab.c:117 [] security_bounded_transition+0xb2/0x3a0 security/selinux/ss/services.c:860 [] selinux_setprocattr+0x8b0/0xa80 security/selinux/hooks.c:5941 [] security_setprocattr+0x8d/0xc0 security/security.c:1177 [] proc_pid_attr_write+0x1bd/0x270 fs/proc/base.c:2510 [] __vfs_write+0x103/0x680 fs/read_write.c:510 [] __kernel_write+0xf0/0x340 fs/read_write.c:532 [] write_pipe_buf+0x159/0x1f0 fs/splice.c:816 [] splice_from_pipe_feed fs/splice.c:521 [inline] [] __splice_from_pipe+0x323/0x730 fs/splice.c:645 [] splice_from_pipe+0xf9/0x160 fs/splice.c:680 [] default_file_splice_write+0x40/0x90 fs/splice.c:828 [] do_splice_from fs/splice.c:870 [inline] [] direct_splice_actor+0x125/0x180 fs/splice.c:1037 [] splice_direct_to_actor+0x2cc/0x800 fs/splice.c:992 [] do_splice_direct+0x1a7/0x270 fs/splice.c:1080 [] do_sendfile+0x54b/0xd30 fs/read_write.c:1401 [] SYSC_sendfile64 fs/read_write.c:1456 [inline] [] SyS_sendfile64+0xd1/0x160 fs/read_write.c:1448 [] entry_SYSCALL_64_fastpath+0x23/0xc6 Code: ea 03 41 83 e4 7f 80 3c 02 00 0f 85 7d 02 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 33 4d 63 e4 4b 8d 1c e6 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 41 02 00 00 48 8b 1b 48 85 db 0f 84 8b 00 00 RIP [] sidtab_search_core+0x6a/0x320 security/selinux/ss/sidtab.c:94 RSP ---[ end trace ad10063b243772cf ]---