BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor4/6286 caller is __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 CPU: 0 PID: 6286 Comm: syz-executor4 Not tainted 4.9.75-g5f5e5d4 #7 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801b515f6d8 ffffffff81d93049 0000000000000000 ffffffff83c17e00 ffffffff83f44900 ffff8801c57f0000 0000000000000003 ffff8801b515f718 ffffffff81dfa614 ffff8801b515f730 ffffffff83f44900 dffffc0000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] check_preemption_disabled+0x1d4/0x200 lib/smp_processor_id.c:46 sg_write: data in/out 458716/120 bytes for SCSI command 0x42-- guessing data in; program syz-executor7 not setting count and/or reply_len properly [] __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 [] ipcomp_alloc_tfms net/xfrm/xfrm_ipcomp.c:286 [inline] [] ipcomp_init_state+0x188/0x930 net/xfrm/xfrm_ipcomp.c:363 [] ipcomp4_init_state+0xb0/0x7d0 net/ipv4/ipcomp.c:137 [] __xfrm_init_state+0x3e7/0xb30 net/xfrm/xfrm_state.c:2096 [] xfrm_init_state+0x1a/0x20 net/xfrm/xfrm_state.c:2122 [] pfkey_msg2xfrm_state net/key/af_key.c:1281 [inline] [] pfkey_add+0x1fb9/0x3470 net/key/af_key.c:1498 [] pfkey_process+0x61e/0x730 net/key/af_key.c:2826 [] pfkey_sendmsg+0x3a9/0x760 net/key/af_key.c:3670 [] sock_sendmsg_nosec net/socket.c:635 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:645 [] ___sys_sendmsg+0x6d1/0x7e0 net/socket.c:1969 [] __sys_sendmsg+0xd6/0x190 net/socket.c:2003 [] SYSC_sendmsg net/socket.c:2014 [inline] [] SyS_sendmsg+0x2d/0x50 net/socket.c:2010 [] entry_SYSCALL_64_fastpath+0x23/0xe2 device syz4 entered promiscuous mode device syz4 left promiscuous mode device syz4 entered promiscuous mode device syz4 left promiscuous mode netlink: 1 bytes leftover after parsing attributes in process `syz-executor6'. IPv6: NLM_F_REPLACE set, but no existing node found! syz-executor6 (6470): /proc/6467/oom_adj is deprecated, please use /proc/6467/oom_score_adj instead. device gre0 entered promiscuous mode audit: type=1400 audit(1515337145.623:30): avc: denied { accept } for pid=6486 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1515337145.653:31): avc: denied { getattr } for pid=6486 comm="syz-executor6" path="socket:[13217]" dev="sockfs" ino=13217 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 devpts: called with bogus options audit: type=1400 audit(1515337146.403:32): avc: denied { attach_queue } for pid=6724 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tun_socket permissive=1 devpts: called with bogus options device gre0 entered promiscuous mode audit: type=1400 audit(1515337147.073:33): avc: denied { getopt } for pid=6890 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. device lo entered promiscuous mode audit: type=1400 audit(1515337147.293:34): avc: denied { connect } for pid=6938 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor1'. device gre0 entered promiscuous mode device gre0 entered promiscuous mode audit: type=1400 audit(1515337148.503:35): avc: denied { create } for pid=7121 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 binder: 7120:7124 Acquire 1 refcount change on invalid ref 0 ret -22 audit: type=1400 audit(1515337148.533:36): avc: denied { getopt } for pid=7121 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 binder: 7120:7124 BC_ACQUIRE_DONE u0000000000000000 node 15 cookie mismatch 0000000000000001 != 0000000000000000 binder: 7120:7124 Acquire 1 refcount change on invalid ref 1 ret -22 binder: BINDER_SET_CONTEXT_MGR already set binder: 7120:7127 ioctl 40046207 0 returned -16 binder: 7120:7127 BC_ACQUIRE_DONE u0000000000000000 no match binder: 7120:7127 Acquire 1 refcount change on invalid ref 1 ret -22 binder: 7140:7142 ioctl c0045c77 0 returned -22 binder: 7140:7142 sending u0000000000000000 node 18, cookie mismatch 0000000000000003 != 0000000000000000 binder: 7140:7142 transaction failed 29201/-22, size 56-8 line 3206 binder_alloc: binder_alloc_mmap_handler: 7140 20000000-20002000 already mapped failed -16 binder: BINDER_SET_CONTEXT_MGR already set binder: 7140:7167 ioctl c0045c77 0 returned -22 binder: 7140:7142 ioctl 40046207 0 returned -16 binder: undelivered TRANSACTION_ERROR: 29201 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 7222 Comm: syz-executor0 Not tainted 4.9.75-g5f5e5d4 #7 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d861f830 ffffffff81d93049 ffff8801d861fb10 0000000000000000 ffff8801cab07c10 ffff8801d861fa00 ffff8801cab07b00 ffff8801d861fa28 ffffffff81660b1a 0000000000002e68 ffff8801d872d0f0 ffff8801d872d0a0 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa3a/0x1310 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5c2/0xd40 arch/x86/mm/fault.c:1406 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1469 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1038 [] move_addr_to_kernel net/socket.c:1568 [inline] [] SYSC_connect+0x288/0x310 net/socket.c:1553 [] SyS_connect+0x24/0x30 net/socket.c:1543 [] entry_SYSCALL_64_fastpath+0x23/0xe2 device eql entered promiscuous mode audit: type=1400 audit(1515337149.983:37): avc: denied { transfer } for pid=7331 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 binder: BINDER_SET_CONTEXT_MGR already set binder_alloc: 7331: binder_alloc_buf, no vma binder: 7331:7353 ioctl 40046207 0 returned -16 binder: 7331:7355 transaction failed 29189/-3, size 40-8 line 3127 binder: undelivered TRANSACTION_ERROR: 29189 binder: release 7331:7335 transaction 21 out, still active binder: unexpected work type, 4, not freed binder: undelivered TRANSACTION_COMPLETE binder: send failed reply for transaction 21, target dead device gre0 entered promiscuous mode : renamed from syz6 tmpfs: Bad mount option 7 tmpfs: Bad mount option 7 audit: type=1400 audit(1515337151.783:38): avc: denied { create } for pid=7613 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 audit: type=1400 audit(1515337151.823:39): avc: denied { accept } for pid=7621 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1515337151.823:40): avc: denied { fsetid } for pid=7615 comm="syz-executor2" capability=4 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1515337151.823:41): avc: denied { dac_read_search } for pid=7615 comm="syz-executor2" capability=2 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 device syz3 entered promiscuous mode netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. sock: sock_set_timeout: `syz-executor6' (pid 7796) tries to set negative timeout sock: sock_set_timeout: `syz-executor6' (pid 7796) tries to set negative timeout audit: type=1400 audit(1515337152.563:42): avc: denied { net_bind_service } for pid=7826 comm="syz-executor7" capability=10 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 7794 Comm: syz-executor4 Not tainted 4.9.75-g5f5e5d4 #7 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d57a74e0 ffffffff81d93049 ffff8801d57a77c0 0000000000000000 ffff8801d6258890 ffff8801d57a76b0 ffff8801d6258780 ffff8801d57a76d8 ffffffff81660b1a 0000000000007bf0 ffff8801d51d8968 ffff8801d51d88a0 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa3a/0x1310 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5c2/0xd40 arch/x86/mm/fault.c:1406 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1469 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1038 [] generic_perform_write+0x1dc/0x500 mm/filemap.c:2731 [] __generic_file_write_iter+0x348/0x570 mm/filemap.c:2866 [] generic_file_write_iter+0x2d5/0x600 mm/filemap.c:2894 [] new_sync_write fs/read_write.c:499 [inline] [] __vfs_write+0x4bf/0x680 fs/read_write.c:512 [] vfs_write+0x189/0x530 fs/read_write.c:560 [] SYSC_write fs/read_write.c:607 [inline] [] SyS_write+0xd9/0x1b0 fs/read_write.c:599 [] entry_SYSCALL_64_fastpath+0x23/0xe2 audit: type=1400 audit(1515337152.923:43): avc: denied { getattr } for pid=7880 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 device gre0 entered promiscuous mode binder: 8067:8070 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder_alloc: binder_alloc_mmap_handler: 8067 20000000-20002000 already mapped failed -16 binder: BINDER_SET_CONTEXT_MGR already set binder: 8067:8070 ioctl 40046207 0 returned -16 binder_alloc: 8067: binder_alloc_buf, no vma binder: 8067:8084 transaction failed 29189/-3, size 40-8 line 3127 binder: undelivered TRANSACTION_ERROR: 29189 binder: release 8067:8070 transaction 26 out, still active binder: unexpected work type, 4, not freed binder: undelivered TRANSACTION_COMPLETE binder: send failed reply for transaction 26, target dead binder: BINDER_SET_CONTEXT_MGR already set binder: 8122:8147 ioctl 40046207 0 returned -16 binder: 8122:8139 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder: 8122:8147 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0