================================================================== kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 16509 Comm: syz-executor7 Not tainted 4.9.97-g1321d42 #13 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8801ba794800 task.stack: ffff8801bb278000 RIP: 0010:[] [] sock_has_perm+0x1fe/0x3e0 security/selinux/hooks.c:4248 RSP: 0018:ffff8801bb27f7e0 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 1ffff1003764feff RCX: ffff8801ba794800 RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000010 RBP: ffff8801bb27f8e0 R08: ffff8801ba7950e8 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000001 R12: ffff8801bb27f8b8 R13: 0000000000000000 R14: ffff8801cf698880 R15: 0000000000000001 FS: 00007f7268463700(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f55d56bf169 CR3: 00000001da202000 CR4: 00000000001606f0 DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Stack: ffffffff81d0eaaf ffff8801bb27f858 000000028157475b 0000000041b58ab3 ffffffff843dc8fe ffffffff81d0ea10 00007ffffffff000 00000000d9432880 0000000020002c1b ffff8801bb27fdb8 ffff8801bb27f9e0 1ffff1003764ff10 Call Trace: [] selinux_socket_recvmsg+0x3f/0x50 security/selinux/hooks.c:4508 [] security_socket_recvmsg+0x8b/0xc0 security/security.c:1289 [] sock_recvmsg+0x4b/0x110 net/socket.c:742 [] ___sys_recvmsg+0x242/0x550 net/socket.c:2128 [] __sys_recvmmsg+0x25d/0x700 net/socket.c:2236 [] SYSC_recvmmsg net/socket.c:2317 [inline] [] SyS_recvmmsg+0xeb/0x1c0 net/socket.c:2301 [] do_syscall_64+0x1a6/0x490 arch/x86/entry/common.c:282 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: c2 d2 eb d0 81 be 01 00 00 00 48 c7 c7 20 ef 6d 84 e8 17 a5 52 ff 49 8d 7d 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8b 01 00 00 41 8b 75 10 31 RIP [] sock_has_perm+0x1fe/0x3e0 security/selinux/hooks.c:4248 RSP ---[ end trace ee7ef3ea1fbf2449 ]---