PF_BRIDGE: RTM_DELNEIGH with invalid address PF_BRIDGE: RTM_DELNEIGH with invalid address audit: type=1400 audit(1570695392.592:22): avc: denied { call } for pid=4467 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 audit: type=1400 audit(1570695392.602:23): avc: denied { transfer } for pid=4467 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 ------------[ cut here ]------------ kernel BUG at drivers/android/binder_alloc.c:1108! invalid opcode: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 4470 Comm: syz-executor.2 Not tainted 4.9.194+ #0 task: 0000000016ef463d task.stack: 000000007173f6d3 RIP: 0010:[] [<00000000303c1997>] binder_alloc_do_buffer_copy+0xcb/0x500 drivers/android/binder_alloc.c:1108 RSP: 0018:ffff8801cafdf4a8 EFLAGS: 00010216 RAX: 0000000000040000 RBX: 0000000020ffc000 RCX: ffffc90002525000 RDX: 000000000001b96a RSI: ffffffff8223a8fb RDI: ffff8801ca49d2d8 RBP: ffff8801cafdf528 R08: ffff8801cafdf5a8 R09: 0000000000000008 R10: ffffed00395fbf11 R11: ffff8801cafdf88f R12: 0000000000000060 R13: 0000000000000248 R14: 0000000000000008 R15: ffff8801cafdf5a8 FS: 00007fc7c85f6700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fae5e448330 CR3: 00000001ca779000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffff8801d3073328 ffffffff82216590 ffff8801d3073328 3651c8d0d7a41bb1 ffff8801d6bee030 ffff8801d6bf63d8 00ff8801cafdf870 ffff8801d6bf6380 ffffffff814fdcb6 ffff8801d1660200 0000000000000248 ffff8801cafdf5a8 Call Trace: [<00000000a28f29a1>] binder_alloc_copy_from_buffer+0x37/0x42 drivers/android/binder_alloc.c:1154 [<0000000054c54789>] binder_validate_ptr+0xc5/0x1b0 drivers/android/binder.c:2335 [<00000000b20ced2b>] binder_transaction+0x20a4/0x5890 drivers/android/binder.c:3444 [<00000000d545d435>] binder_thread_write+0x583/0x20e0 drivers/android/binder.c:3917 [<0000000081b85cc2>] binder_ioctl_write_read drivers/android/binder.c:4854 [inline] [<0000000081b85cc2>] binder_ioctl+0xecd/0x1720 drivers/android/binder.c:5030 [<000000007cc1d1e8>] vfs_ioctl fs/ioctl.c:43 [inline] [<000000007cc1d1e8>] file_ioctl fs/ioctl.c:493 [inline] [<000000007cc1d1e8>] do_vfs_ioctl+0xb87/0x11d0 fs/ioctl.c:677 [<0000000057412a31>] SYSC_ioctl fs/ioctl.c:694 [inline] [<0000000057412a31>] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:685 [<00000000b2ab6bb8>] do_syscall_64+0x1ad/0x5c0 arch/x86/entry/common.c:288 [<00000000853fec11>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 0a 04 00 00 4d 8b 64 24 58 49 29 dc e8 0f 7e 0e ff 4d 39 e6 76 07 e8 05 7e 0e ff <0f> 0b e8 fe 7d 0e ff 4c 8b 6d d0 4d 29 f4 4d 39 e5 77 e8 e8 ed RIP [<00000000303c1997>] binder_alloc_do_buffer_copy+0xcb/0x500 drivers/android/binder_alloc.c:1108 RSP ---[ end trace 00219c7e7bffadb7 ]---