check_preemption_disabled: 9 callbacks suppressed BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor4/6508 caller is __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 CPU: 0 PID: 6508 Comm: syz-executor4 Not tainted 4.9.79-g71f1469 #25 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cf39f490 ffffffff81d94829 0000000000000000 ffffffff83c18800 ffffffff83f454c0 ffff8801cf189800 0000000000000003 ffff8801cf39f4d0 ffffffff81dfbe04 ffff8801cf39f4e8 ffffffff83f454c0 dffffc0000000000 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] check_preemption_disabled+0x1d4/0x200 lib/smp_processor_id.c:46 ====================================================== [ INFO: possible circular locking dependency detected ] 4.9.79-g71f1469 #25 Not tainted ------------------------------------------------------- syz-executor1/6530 is trying to acquire lock: (&sb->s_type->i_mutex_key#10){++++++}, at: [] inode_lock include/linux/fs.h:746 [inline] (&sb->s_type->i_mutex_key#10){++++++}, at: [] shmem_file_llseek+0xef/0x240 mm/shmem.c:2403 but task is already holding lock: (ashmem_mutex){+.+.+.}, at: [] ashmem_llseek+0x56/0x1f0 drivers/staging/android/ashmem.c:343 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (ashmem_mutex){+.+.+.}: lock_acquire+0x12e/0x410 kernel/locking/lockdep.c:3756 __mutex_lock_common kernel/locking/mutex.c:521 [inline] mutex_lock_nested+0xbb/0x870 kernel/locking/mutex.c:621 ashmem_mmap+0x53/0x400 drivers/staging/android/ashmem.c:379 mmap_region+0x7dd/0xfd0 mm/mmap.c:1694 do_mmap+0x57b/0xbe0 mm/mmap.c:1473 do_mmap_pgoff include/linux/mm.h:2019 [inline] vm_mmap_pgoff+0x16b/0x1b0 mm/util.c:305 SYSC_mmap_pgoff mm/mmap.c:1523 [inline] SyS_mmap_pgoff+0x33f/0x560 mm/mmap.c:1481 SYSC_mmap arch/x86/kernel/sys_x86_64.c:95 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:86 entry_SYSCALL_64_fastpath+0x29/0xe8 -> #1 (&mm->mmap_sem){++++++}: lock_acquire+0x12e/0x410 kernel/locking/lockdep.c:3756 __might_fault+0x14a/0x1d0 mm/memory.c:3994 copy_to_user arch/x86/include/asm/uaccess.h:718 [inline] filldir+0x1aa/0x340 fs/readdir.c:195 dir_emit_dot include/linux/fs.h:3203 [inline] dir_emit_dots include/linux/fs.h:3214 [inline] dcache_readdir+0x12d/0x5e0 fs/libfs.c:191 iterate_dir+0x4a6/0x5d0 fs/readdir.c:50 SYSC_getdents fs/readdir.c:230 [inline] SyS_getdents+0x14a/0x2a0 fs/readdir.c:211 entry_SYSCALL_64_fastpath+0x29/0xe8 -> #0 (&sb->s_type->i_mutex_key#10){++++++}: check_prev_add kernel/locking/lockdep.c:1828 [inline] check_prevs_add kernel/locking/lockdep.c:1938 [inline] validate_chain kernel/locking/lockdep.c:2265 [inline] __lock_acquire+0x2bf9/0x3640 kernel/locking/lockdep.c:3345 lock_acquire+0x12e/0x410 kernel/locking/lockdep.c:3756 down_write+0x41/0xa0 kernel/locking/rwsem.c:52 inode_lock include/linux/fs.h:746 [inline] shmem_file_llseek+0xef/0x240 mm/shmem.c:2403 vfs_llseek+0xa2/0xd0 fs/read_write.c:301 ashmem_llseek+0xe7/0x1f0 drivers/staging/android/ashmem.c:355 vfs_llseek fs/read_write.c:301 [inline] SYSC_lseek fs/read_write.c:314 [inline] SyS_lseek+0xeb/0x170 fs/read_write.c:305 entry_SYSCALL_64_fastpath+0x29/0xe8 other info that might help us debug this: Chain exists of: &sb->s_type->i_mutex_key#10 --> &mm->mmap_sem --> ashmem_mutex Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(ashmem_mutex); lock(&mm->mmap_sem); lock(ashmem_mutex); lock(&sb->s_type->i_mutex_key#10); *** DEADLOCK *** 1 lock held by syz-executor1/6530: #0: (ashmem_mutex){+.+.+.}, at: [] ashmem_llseek+0x56/0x1f0 drivers/staging/android/ashmem.c:343 stack backtrace: [] __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 [] ipcomp_alloc_tfms net/xfrm/xfrm_ipcomp.c:286 [inline] [] ipcomp_init_state+0x188/0x930 net/xfrm/xfrm_ipcomp.c:363 [] ipcomp4_init_state+0xb0/0x7d0 net/ipv4/ipcomp.c:137 [] __xfrm_init_state+0x3e7/0xb30 net/xfrm/xfrm_state.c:2096 [] xfrm_state_construct net/xfrm/xfrm_user.c:590 [inline] [] xfrm_add_sa+0x1916/0x2e40 net/xfrm/xfrm_user.c:639 [] xfrm_user_rcv_msg+0x413/0x6a0 net/xfrm/xfrm_user.c:2525 [] netlink_rcv_skb+0x13e/0x370 net/netlink/af_netlink.c:2351 [] xfrm_netlink_rcv+0x6f/0x90 net/xfrm/xfrm_user.c:2533 [] netlink_unicast_kernel net/netlink/af_netlink.c:1275 [inline] [] netlink_unicast+0x511/0x750 net/netlink/af_netlink.c:1301 [] netlink_sendmsg+0x8e8/0xc50 net/netlink/af_netlink.c:1847 [] sock_sendmsg_nosec net/socket.c:635 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:645 [] ___sys_sendmsg+0x6d1/0x7e0 net/socket.c:1969 [] __sys_sendmsg+0xd6/0x190 net/socket.c:2003 [] SYSC_sendmsg net/socket.c:2014 [inline] [] SyS_sendmsg+0x2d/0x50 net/socket.c:2010 [] entry_SYSCALL_64_fastpath+0x29/0xe8 CPU: 1 PID: 6530 Comm: syz-executor1 Not tainted 4.9.79-g71f1469 #25 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cdfdfb98 ffffffff81d94829 ffffffff853a0d50 ffffffff853aada0 ffffffff853c1360 ffff8801bf17a0d8 ffff8801bf179800 ffff8801cdfdfbe0 ffffffff81238631 ffff8801bf17a0d8 00000000bf17a0b0 ffff8801bf17a0d8 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_circular_bug+0x271/0x310 kernel/locking/lockdep.c:1202 [] check_prev_add kernel/locking/lockdep.c:1828 [inline] [] check_prevs_add kernel/locking/lockdep.c:1938 [inline] [] validate_chain kernel/locking/lockdep.c:2265 [inline] [] __lock_acquire+0x2bf9/0x3640 kernel/locking/lockdep.c:3345 [] lock_acquire+0x12e/0x410 kernel/locking/lockdep.c:3756 [] down_write+0x41/0xa0 kernel/locking/rwsem.c:52 [] inode_lock include/linux/fs.h:746 [inline] [] shmem_file_llseek+0xef/0x240 mm/shmem.c:2403 [] vfs_llseek+0xa2/0xd0 fs/read_write.c:301 [] ashmem_llseek+0xe7/0x1f0 drivers/staging/android/ashmem.c:355 [] vfs_llseek fs/read_write.c:301 [inline] [] SYSC_lseek fs/read_write.c:314 [inline] [] SyS_lseek+0xeb/0x170 fs/read_write.c:305 [] entry_SYSCALL_64_fastpath+0x29/0xe8 audit: type=1400 audit(1517540073.967:28): avc: denied { setopt } for pid=6540 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1517540073.977:29): avc: denied { create } for pid=6546 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 audit: type=1400 audit(1517540073.977:30): avc: denied { write } for pid=6546 comm="syz-executor3" path="socket:[15062]" dev="sockfs" ino=15062 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 device eql entered promiscuous mode netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 7 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 7 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. binder: BINDER_SET_CONTEXT_MGR already set binder: 6671:6690 ioctl 40046207 0 returned -16 binder: 6671:6690 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder: 6671:6681 Release 1 refcount change on invalid ref 0 ret -22 syz-executor6: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) CPU: 0 PID: 6744 Comm: syz-executor6 Not tainted 4.9.79-g71f1469 #25 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cc2af938 ffffffff81d94829 1ffff10039855f2a ffff8801b1ae4800 ffffffff83ab8ea0 0000000000000001 0000000000400000 ffff8801cc2afa48 ffffffff81451c92 024000c200000246 0000000041b58ab3 ffffffff84195205 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] warn_alloc+0x212/0x240 mm/page_alloc.c:3056 [] __vmalloc_node_range+0x3f5/0x5f0 mm/vmalloc.c:1722 [] __vmalloc_node mm/vmalloc.c:1744 [inline] [] __vmalloc_node_flags mm/vmalloc.c:1758 [inline] [] vmalloc+0x5b/0x70 mm/vmalloc.c:1773 [] sel_write_load+0x130/0xfd0 security/selinux/selinuxfs.c:514 [] __vfs_write+0x103/0x680 fs/read_write.c:510 [] vfs_write+0x189/0x530 fs/read_write.c:560 [] SYSC_write fs/read_write.c:607 [inline] [] SyS_write+0xd9/0x1b0 fs/read_write.c:599 [] entry_SYSCALL_64_fastpath+0x29/0xe8 Mem-Info: active_anon:57936 inactive_anon:44 isolated_anon:0 active_file:3513 inactive_file:8309 isolated_file:0 unevictable:0 dirty:115 writeback:0 unstable:0 slab_reclaimable:6480 slab_unreclaimable:60205 mapped:24131 shmem:51 pagetables:685 bounce:0 free:1470552 free_pcp:395 free_cma:0 Node 0 active_anon:213096kB inactive_anon:176kB active_file:14052kB inactive_file:33248kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:96448kB dirty:472kB writeback:0kB shmem:204kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 67584kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no DMA free:15908kB min:160kB low:200kB high:240kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 2908 6410 6410 DMA32 free:2979960kB min:30592kB low:38240kB high:45888kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2980720kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:760kB local_pcp:48kB free_cma:0kB lowmem_reserve[]: 0 0 3501 3501 Normal free:2903660kB min:36824kB low:46028kB high:55232kB active_anon:215048kB inactive_anon:176kB active_file:14052kB inactive_file:33248kB unevictable:0kB writepending:476kB present:4718592kB managed:3585212kB mlocked:0kB slab_reclaimable:25920kB slab_unreclaimable:240828kB kernel_stack:5440kB pagetables:2560kB bounce:0kB free_pcp:940kB local_pcp:224kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB DMA32: 2*4kB (M) 2*8kB (M) 2*16kB (M) 2*32kB (M) 2*64kB (M) 3*128kB (M) 2*256kB (M) 4*512kB (M) 1*1024kB (M) 1*2048kB (M) 726*4096kB (M) = 2979960kB Normal: 889*4kB (UME) 498*8kB (UM) 398*16kB (UM) 100*32kB (UME) 133*64kB (UME) 29*128kB (UME) 16*256kB (UME) 6*512kB (UM) 4*1024kB (M) 2*2048kB (ME) 698*4096kB (M) = 2903700kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 11878 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965969 pages RAM 0 pages HighMem/MovableOnly 320509 pages reserved syz-executor6: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) CPU: 1 PID: 6784 Comm: syz-executor6 Not tainted 4.9.79-g71f1469 #25 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d3017938 ffffffff81d94829 1ffff1003a602f2a ffff8801ccbbc800 ffffffff83ab8ea0 0000000000000001 0000000000400000 ffff8801d3017a48 ffffffff81451c92 024000c200000246 0000000041b58ab3 ffffffff84195205 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] warn_alloc+0x212/0x240 mm/page_alloc.c:3056 [] __vmalloc_node_range+0x3f5/0x5f0 mm/vmalloc.c:1722 [] __vmalloc_node mm/vmalloc.c:1744 [inline] [] __vmalloc_node_flags mm/vmalloc.c:1758 [inline] [] vmalloc+0x5b/0x70 mm/vmalloc.c:1773 [] sel_write_load+0x130/0xfd0 security/selinux/selinuxfs.c:514 [] __vfs_write+0x103/0x680 fs/read_write.c:510 [] vfs_write+0x189/0x530 fs/read_write.c:560 [] SYSC_write fs/read_write.c:607 [inline] [] SyS_write+0xd9/0x1b0 fs/read_write.c:599 [] entry_SYSCALL_64_fastpath+0x29/0xe8 Mem-Info: active_anon:53757 inactive_anon:44 isolated_anon:0 active_file:3513 inactive_file:8312 isolated_file:0 unevictable:0 dirty:121 writeback:0 unstable:0 slab_reclaimable:6488 slab_unreclaimable:60235 mapped:24094 shmem:51 pagetables:627 bounce:0 free:1474900 free_pcp:419 free_cma:0 Node 0 active_anon:215028kB inactive_anon:176kB active_file:14052kB inactive_file:33248kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:96376kB dirty:484kB writeback:0kB shmem:204kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 75776kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no DMA free:15908kB min:160kB low:200kB high:240kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 2908 6410 6410 DMA32 free:2979960kB min:30592kB low:38240kB high:45888kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2980720kB mlocked:0kB slab_reclaimable:0kB slab_unreclaimable:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:760kB local_pcp:712kB free_cma:0kB lowmem_reserve[]: 0 0 3501 3501 Normal free:2903732kB min:36824kB low:46028kB high:55232kB active_anon:215028kB inactive_anon:176kB active_file:14052kB inactive_file:33248kB unevictable:0kB writepending:484kB present:4718592kB managed:3585212kB mlocked:0kB slab_reclaimable:25952kB slab_unreclaimable:240940kB kernel_stack:5408kB pagetables:2508kB bounce:0kB free_pcp:916kB local_pcp:708kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB DMA32: 2*4kB (M) 2*8kB (M) 2*16kB (M) 2*32kB (M) 2*64kB (M) 3*128kB (M) 2*256kB (M) 4*512kB (M) 1*1024kB (M) 1*2048kB (M) 726*4096kB (M) = 2979960kB Normal: 889*4kB (UME) 498*8kB (UM) 397*16kB (UM) 101*32kB (UME) 133*64kB (UME) 29*128kB (UME) 16*256kB (UME) 6*512kB (UM) 4*1024kB (M) 2*2048kB (ME) 698*4096kB (M) = 2903716kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 11878 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965969 pages RAM 0 pages HighMem/MovableOnly 320509 pages reserved sock: sock_set_timeout: `syz-executor6' (pid 6829) tries to set negative timeout sock: sock_set_timeout: `syz-executor6' (pid 6805) tries to set negative timeout audit: type=1400 audit(1517540076.607:31): avc: denied { write } for pid=6848 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 device gre0 entered promiscuous mode binder: 6944:6950 BC_INCREFS_DONE u0000000000000000 node 13 cookie mismatch 0000000000000003 != 0000000000000000 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 6938 Comm: syz-executor2 Not tainted 4.9.79-g71f1469 #25 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801bf3af5d0 ffffffff81d94829 ffff8801bf3af8b0 0000000000000000 ffff8801c0731790 ffff8801bf3af7a0 ffff8801c0731680 ffff8801bf3af7c8 ffffffff816621ca 0000000041b58ab3 ffff8801bf3af720 00000001bc183067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa3a/0x1310 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5c2/0xd40 arch/x86/mm/fault.c:1407 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1470 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1055 [] vfs_ioctl fs/ioctl.c:43 [inline] [] do_vfs_ioctl+0x1aa/0x1140 fs/ioctl.c:679 [] SYSC_ioctl fs/ioctl.c:694 [inline] [] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:685 [] entry_SYSCALL_64_fastpath+0x29/0xe8 binder: BINDER_SET_CONTEXT_MGR already set binder: 6944:6971 ioctl 40046207 0 returned -16 binder: 6944:6971 BC_INCREFS_DONE u0000000000000000 no match binder: 7013:7024 got reply transaction with bad transaction stack, transaction 15 has target 7013:0 binder: 7013:7024 transaction failed 29201/-71, size 32-0 line 2935 binder: 7013:7024 DecRefs 0 refcount change on invalid ref 1 ret -22 binder: 7013:7024 BC_INCREFS_DONE node 14 has no pending increfs request binder: 7013:7024 ioctl c0306201 2000efd0 returned -11 binder: release 7013:7024 transaction 15 out, still active binder: 7013:7037 transaction failed 29189/-22, size 0-0 line 3004 binder: 7013:7055 got reply transaction with no transaction stack binder: 7013:7055 transaction failed 29201/-71, size 32-0 line 2920 binder: send failed reply for transaction 15, target dead binder: undelivered TRANSACTION_ERROR: 29189 binder: 7161:7169 ERROR: BC_REGISTER_LOOPER called without request audit: type=1400 audit(1517540077.877:32): avc: denied { transfer } for pid=7161 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 binder: unexpected work type, 4, not freed binder: undelivered TRANSACTION_COMPLETE binder: undelivered TRANSACTION_COMPLETE binder: 7161:7182 ERROR: BC_REGISTER_LOOPER called without request binder: undelivered transaction 21, process died. binder: release 7161:7169 transaction 25 out, still active binder: undelivered TRANSACTION_COMPLETE binder: send failed reply for transaction 25, target dead IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 audit: type=1400 audit(1517540078.067:33): avc: denied { connect } for pid=7222 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 SELinux: truncated policydb string identifier SELinux: truncated policydb string identifier binder: 7255:7258 BC_INCREFS_DONE u3b4e000200000000 no match binder: 7255:7262 BC_INCREFS_DONE u3b4e000200000000 no match l2tp_core: tunl 59: sockfd_lookup(fd=0) returned -88 l2tp_core: tunl 59: sockfd_lookup(fd=0) returned -88 audit: type=1400 audit(1517540079.327:34): avc: denied { add_name } for pid=7513 comm="syz-executor7" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 audit: type=1400 audit(1517540079.387:35): avc: denied { create } for pid=7513 comm="syz-executor7" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 mip6: mip6_destopt_init_state: spi is not 0: 3607363584 mip6: mip6_destopt_init_state: spi is not 0: 3607363584 device lo entered promiscuous mode binder: 7674:7684 tried to acquire reference to desc 0, got 1 instead device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64309 sclass=netlink_route_socket pig=8063 comm=syz-executor3 binder: 8062:8065 not enough space to store 1 fds in buffer binder: 8062:8065 transaction failed 29201/-22, size 80-16 line 3269 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8074 comm=syz-executor3 binder_alloc: binder_alloc_mmap_handler: 8062 20000000-20002000 already mapped failed -16 binder: BINDER_SET_CONTEXT_MGR already set binder: 8062:8065 ioctl 40046207 0 returned -16 binder_alloc: 8062: binder_alloc_buf, no vma binder: 8062:8077 transaction failed 29189/-3, size 80-16 line 3127 FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 70 CPU: 1 PID: 8161 Comm: syz-executor3 Not tainted 4.9.79-g71f1469 #25 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801b2267ae0 ffffffff81d94829 ffff8801b2267dc0 0000000000000000 ffff8801c0730410 ffff8801b2267cb0 ffff8801c0730300 ffff8801b2267cd8 ffffffff816621ca ffff8801b2267b10 ffff8801b2267c30 00000001cd5b6067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa3a/0x1310 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5c2/0xd40 arch/x86/mm/fault.c:1407 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1470 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1055 CPU: 0 PID: 8171 Comm: syz-executor3 Not tainted 4.9.79-g71f1469 #25 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d7727980 ffffffff81d94829 ffff8801d7727c60 0000000000000000 ffff8801c0730410 ffff8801d7727b50 ffff8801c0730300 ffff8801d7727b78 ffffffff816621ca ffffffff811c686b ffff8801d7727ad0 00000001cd5b6067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa3a/0x1310 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5c2/0xd40 arch/x86/mm/fault.c:1407 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1470 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1055 [] entry_SYSCALL_64_fastpath+0x29/0xe8 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 audit: type=1400 audit(1517540082.637:36): avc: denied { setuid } for pid=8264 comm="syz-executor6" capability=7 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1