BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor7/14511 caller is __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 CPU: 0 PID: 14511 Comm: syz-executor7 Not tainted 4.4.113-g962d1f3 #2 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 0e40a4d0e06693bd ffff8800b8fbf6c8 ffffffff81d028ed 0000000000000000 ffffffff839fe3a0 ffffffff83cef6a0 ffff8801d4994740 0000000000000003 ffff8800b8fbf708 ffffffff81d62834 ffffffff810002b8 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] check_preemption_disabled+0x1d4/0x200 lib/smp_processor_id.c:46 [] ? 0xffffffff810002b8 [] __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 [] tcp_try_coalesce+0x249/0x4d0 net/ipv4/tcp_input.c:4278 [] tcp_queue_rcv+0x127/0x720 net/ipv4/tcp_input.c:4485 [] tcp_send_rcvq+0x39b/0x450 net/ipv4/tcp_input.c:4531 [] tcp_sendmsg+0x1e8f/0x2b10 net/ipv4/tcp.c:1134 [] inet_sendmsg+0x2bc/0x4c0 net/ipv4/af_inet.c:755 netlink: 11 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor4'. [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:635 [] ___sys_sendmsg+0x6c1/0x7c0 net/socket.c:1962 [] __sys_sendmsg+0xd3/0x190 net/socket.c:1996 [] SYSC_sendmsg net/socket.c:2007 [inline] [] SyS_sendmsg+0x2d/0x50 net/socket.c:2003 [] entry_SYSCALL_64_fastpath+0x1c/0x98 audit: type=1326 audit(1517361943.594:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14564 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x453299 code=0x0 audit: type=1326 audit(1517361943.654:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14564 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x453299 code=0x0 netlink: 11 bytes leftover after parsing attributes in process `syz-executor4'. binder: 14629:14632 got reply transaction with no transaction stack binder: BINDER_SET_CONTEXT_MGR already set binder: 14626:14641 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder: 14629:14632 transaction failed 29201/-71, size 24-0 line 2921 binder: 14626:14630 ioctl 40046207 0 returned -16 binder: 14626:14630 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 binder: undelivered TRANSACTION_ERROR: 29201 netlink: 2 bytes leftover after parsing attributes in process `syz-executor1'. binder: tried to use weak ref as strong ref binder: 14688:14693 Release 1 refcount change on invalid ref 2 ret -22 binder: 14688:14693 ioctl c0306201 20c56000 returned -11 binder_alloc: binder_alloc_mmap_handler: 14688 20000000-20002000 already mapped failed -16 binder: BINDER_SET_CONTEXT_MGR already set binder: 14688:14693 ioctl 40046207 0 returned -16 binder_alloc: 14688: binder_alloc_buf, no vma binder: 14688:14693 transaction failed 29189/-3, size 80-16 line 3128 binder: 14688:14694 Release 1 refcount change on invalid ref 2 ret -22 binder: undelivered TRANSACTION_ERROR: 29189 binder: release 14688:14693 transaction 78 out, still active binder: unexpected work type, 4, not freed binder: unexpected work type, 4, not freed binder: undelivered TRANSACTION_COMPLETE binder: send failed reply for transaction 78, target dead netlink: 2 bytes leftover after parsing attributes in process `syz-executor1'. device gre0 entered promiscuous mode SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket audit: type=1400 audit(1517361947.604:61): avc: denied { bind } for pid=14983 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 binder: 15102:15106 ioctl 40046205 0 returned -22 binder: undelivered death notification, 0000000000000000 binder: undelivered death notification, 0000000000000000 audit: type=1400 audit(1517361949.054:62): avc: denied { execute } for pid=15331 comm="syz-executor5" path="/proc/449/task/450/limits" dev="proc" ino=27875 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor5/15514 caller is __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 CPU: 1 PID: 15514 Comm: syz-executor5 Not tainted 4.4.113-g962d1f3 #2 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 0eba1e030bdf2caa ffff8801d2c0f468 ffffffff81d028ed 0000000000000001 ffffffff839fe3a0 ffffffff83d0b8a0 ffff8801d33f0000 0000000000000003 ffff8801d2c0f4a8 ffffffff81d62834 ffff8801d2c0f4c0 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] check_preemption_disabled+0x1d4/0x200 lib/smp_processor_id.c:46 [] __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 [] ipcomp_alloc_tfms net/xfrm/xfrm_ipcomp.c:286 [inline] [] ipcomp_init_state+0x188/0x980 net/xfrm/xfrm_ipcomp.c:363 [] ipcomp6_init_state+0xb5/0x820 net/ipv6/ipcomp6.c:165 [] __xfrm_init_state+0x3e7/0xb30 net/xfrm/xfrm_state.c:2058 [] xfrm_state_construct net/xfrm/xfrm_user.c:590 [inline] [] xfrm_add_sa+0x1916/0x2e40 net/xfrm/xfrm_user.c:636 [] xfrm_user_rcv_msg+0x41c/0x6b0 net/xfrm/xfrm_user.c:2525 [] netlink_rcv_skb+0x13e/0x370 net/netlink/af_netlink.c:2349 [] xfrm_netlink_rcv+0x6f/0x90 net/xfrm/xfrm_user.c:2533 [] netlink_unicast_kernel net/netlink/af_netlink.c:1267 [inline] [] netlink_unicast+0x522/0x760 net/netlink/af_netlink.c:1293 [] netlink_sendmsg+0x8e8/0xc50 net/netlink/af_netlink.c:1847 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:635 [] ___sys_sendmsg+0x6c1/0x7c0 net/socket.c:1962 [] __sys_sendmsg+0xd3/0x190 net/socket.c:1996 [] SYSC_sendmsg net/socket.c:2007 [inline] [] SyS_sendmsg+0x2d/0x50 net/socket.c:2003 [] entry_SYSCALL_64_fastpath+0x1c/0x98 BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor5/15541 caller is __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 CPU: 1 PID: 15541 Comm: syz-executor5 Not tainted 4.4.113-g962d1f3 #2 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 f5b28d05d2bf52fc ffff8801d213f468 ffffffff81d028ed 0000000000000001 ffffffff839fe3a0 ffffffff83d0b8a0 ffff8801c47fc740 0000000000000003 ffff8801d213f4a8 ffffffff81d62834 ffff8801d213f4c0 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] check_preemption_disabled+0x1d4/0x200 lib/smp_processor_id.c:46 [] __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 [] ipcomp_alloc_tfms net/xfrm/xfrm_ipcomp.c:286 [inline] [] ipcomp_init_state+0x188/0x980 net/xfrm/xfrm_ipcomp.c:363 [] ipcomp6_init_state+0xb5/0x820 net/ipv6/ipcomp6.c:165 [] __xfrm_init_state+0x3e7/0xb30 net/xfrm/xfrm_state.c:2058 [] xfrm_state_construct net/xfrm/xfrm_user.c:590 [inline] [] xfrm_add_sa+0x1916/0x2e40 net/xfrm/xfrm_user.c:636 [] xfrm_user_rcv_msg+0x41c/0x6b0 net/xfrm/xfrm_user.c:2525 [] netlink_rcv_skb+0x13e/0x370 net/netlink/af_netlink.c:2349 [] xfrm_netlink_rcv+0x6f/0x90 net/xfrm/xfrm_user.c:2533 [] netlink_unicast_kernel net/netlink/af_netlink.c:1267 [inline] [] netlink_unicast+0x522/0x760 net/netlink/af_netlink.c:1293 [] netlink_sendmsg+0x8e8/0xc50 net/netlink/af_netlink.c:1847 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:635 [] ___sys_sendmsg+0x6c1/0x7c0 net/socket.c:1962 [] __sys_sendmsg+0xd3/0x190 net/socket.c:1996 [] SYSC_sendmsg net/socket.c:2007 [inline] [] SyS_sendmsg+0x2d/0x50 net/socket.c:2003 [] entry_SYSCALL_64_fastpath+0x1c/0x98 binder: 15587:15590 ioctl c0306201 20007000 returned -14 binder: 15587:15599 unknown command 0 binder: 15587:15599 ioctl c0306201 20007000 returned -22 audit: type=1400 audit(1517361950.204:63): avc: denied { setattr } for pid=15612 comm="syz-executor7" name="projid_map" dev="proc" ino=27080 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 device gre0 entered promiscuous mode TCP: request_sock_TCPv6: Possible SYN flooding on port 20030. Sending cookies. Check SNMP counters. binder: BINDER_SET_CONTEXT_MGR already set binder: 15652:15669 ioctl 40046207 0 returned -16 binder: undelivered transaction 89, process died. binder: undelivered TRANSACTION_COMPLETE audit: type=1400 audit(1517361951.214:64): avc: denied { accept } for pid=15783 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1517361951.824:65): avc: denied { getattr } for pid=15832 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1517361953.084:66): avc: denied { getattr } for pid=15945 comm="syz-executor5" path="socket:[28188]" dev="sockfs" ino=28188 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 IPv4: Oversized IP packet from 127.0.0.1