BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor6/7149 caller is __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 CPU: 0 PID: 7149 Comm: syz-executor6 Not tainted 4.4.113-g962d1f3 #2 audit: type=1400 audit(1517261790.672:19): avc: denied { read } for pid=7135 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 5624182789847450 ffff8800b6d0f800 ffffffff81d028ed 0000000000000000 ffffffff839fe3a0 ffffffff83cef6a0 ffff8800b6d80000 0000000000000003 ffff8800b6d0f840 ffffffff81d62834 ffffffff810002b8 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] check_preemption_disabled+0x1d4/0x200 lib/smp_processor_id.c:46 [] ? 0xffffffff810002b8 [] __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 [] tcp_try_coalesce+0x249/0x4d0 net/ipv4/tcp_input.c:4278 [] tcp_queue_rcv+0x127/0x720 net/ipv4/tcp_input.c:4485 [] tcp_send_rcvq+0x39b/0x450 net/ipv4/tcp_input.c:4531 [] tcp_sendmsg+0x1e8f/0x2b10 net/ipv4/tcp.c:1134 binder: 7176:7177 ERROR: BC_REGISTER_LOOPER called without request [] inet_sendmsg+0x2bc/0x4c0 net/ipv4/af_inet.c:755 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:635 [] SYSC_sendto+0x2c8/0x340 net/socket.c:1665 binder: 7176:7180 got reply transaction with bad transaction stack, transaction 13 has target 7176:7177 binder: 7176:7180 transaction failed 29201/-71, size 32-0 line 2936 binder_alloc: binder_alloc_mmap_handler: 7176 20000000-20002000 already mapped failed -16 binder: BINDER_SET_CONTEXT_MGR already set binder: 7176:7191 ioctl 40046207 0 returned -16 binder_alloc: 7176: binder_alloc_buf, no vma binder: 7176:7180 transaction failed 29189/-3, size 0-0 line 3128 [] SyS_sendto+0x40/0x50 net/socket.c:1633 [] entry_SYSCALL_64_fastpath+0x1c/0x98 binder: undelivered TRANSACTION_ERROR: 29189 binder: release 7176:7177 transaction 13 in, still active BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor6/7197 caller is __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 CPU: 0 PID: 7197 Comm: syz-executor6 Not tainted 4.4.113-g962d1f3 #2 binder: send failed reply for transaction 13 to 7176:7180 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 c31b96925c5ada5f ffff8801d4f5f6c8 ffffffff81d028ed 0000000000000000 ffffffff839fe3a0 ffffffff83cef6a0 ffff8801d4f0af80 0000000000000003 ffff8801d4f5f708 ffffffff81d62834 ffffffff810002b8 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] check_preemption_disabled+0x1d4/0x200 lib/smp_processor_id.c:46 [] ? 0xffffffff810002b8 [] __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 [] tcp_try_coalesce+0x249/0x4d0 net/ipv4/tcp_input.c:4278 [] tcp_queue_rcv+0x127/0x720 net/ipv4/tcp_input.c:4485 [] tcp_send_rcvq+0x39b/0x450 net/ipv4/tcp_input.c:4531 [] tcp_sendmsg+0x1e8f/0x2b10 net/ipv4/tcp.c:1134 [] inet_sendmsg+0x2bc/0x4c0 net/ipv4/af_inet.c:755 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:635 [] ___sys_sendmsg+0x6c1/0x7c0 net/socket.c:1962 [] __sys_sendmsg+0xd3/0x190 net/socket.c:1996 [] SYSC_sendmsg net/socket.c:2007 [inline] [] SyS_sendmsg+0x2d/0x50 net/socket.c:2003 [] entry_SYSCALL_64_fastpath+0x1c/0x98 binder: undelivered TRANSACTION_COMPLETE binder: undelivered TRANSACTION_ERROR: 29201 binder: undelivered TRANSACTION_ERROR: 29189 binder: 7205:7213 transaction failed 29189/-22, size 0-0 line 3005 binder: undelivered TRANSACTION_ERROR: 29189 audit: type=1400 audit(1517261792.882:20): avc: denied { setattr } for pid=7548 comm="syz-executor7" name="fd" dev="proc" ino=14680 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 audit: type=1400 audit(1517261793.402:21): avc: denied { ioctl } for pid=7693 comm="syz-executor3" path="socket:[15556]" dev="sockfs" ino=15556 ioctlcmd=8919 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20010. Sending cookies. Check SNMP counters. device gre0 entered promiscuous mode audit: type=1400 audit(1517261794.942:22): avc: denied { getopt } for pid=7977 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 binder: 8035:8038 ioctl 0 20014000 returned -22 binder: 8035:8038 ioctl 0 20014000 returned -22 binder: 8089:8094 BC_DEAD_BINDER_DONE 0000000000000000 not found audit: type=1400 audit(1517261795.722:23): avc: denied { accept } for pid=8182 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 netlink: 17 bytes leftover after parsing attributes in process `syz-executor3'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2822 sclass=netlink_route_socket proc: unrecognized mount option "Ù" or missing value proc: unrecognized mount option "Ù" or missing value audit: type=1400 audit(1517261797.052:24): avc: denied { setattr } for pid=8529 comm="syz-executor4" name="smaps" dev="proc" ino=15248 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6857 sclass=netlink_route_socket audit: type=1326 audit(1517261797.692:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8656 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x453299 code=0x0 audit: type=1326 audit(1517261797.782:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8656 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x453299 code=0x0 IPVS: Creating netns size=2552 id=9 IPv4: Oversized IP packet from 127.0.0.1