device lo entered promiscuous mode BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor2/5292 caller is __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 CPU: 0 PID: 5292 Comm: syz-executor2 Not tainted 4.4.113-g962d1f3 #2 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 87ba4041e12c91ca ffff8800abc6f800 ffffffff81d028ed 0000000000000000 ffffffff839fe3a0 ffffffff83cef6a0 ffff8800ac0a8000 0000000000000003 ffff8800abc6f840 ffffffff81d62834 ffffffff810002b8 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] check_preemption_disabled+0x1d4/0x200 lib/smp_processor_id.c:46 [] ? 0xffffffff810002b8 [] __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 [] tcp_try_coalesce+0x249/0x4d0 net/ipv4/tcp_input.c:4278 [] tcp_queue_rcv+0x127/0x720 net/ipv4/tcp_input.c:4485 [] tcp_send_rcvq+0x39b/0x450 net/ipv4/tcp_input.c:4531 [] tcp_sendmsg+0x1e8f/0x2b10 net/ipv4/tcp.c:1134 [] inet_sendmsg+0x2bc/0x4c0 net/ipv4/af_inet.c:755 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:635 [] SYSC_sendto+0x2c8/0x340 net/socket.c:1665 [] SyS_sendto+0x40/0x50 net/socket.c:1633 [] entry_SYSCALL_64_fastpath+0x1c/0x98 keychord: using input dev AT Translated Set 2 keyboard for fevent capability: warning: `syz-executor3' uses 32-bit capabilities (legacy support in use) audit: type=1400 audit(1517363995.513:5): avc: denied { create } for pid=5390 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1517363995.563:6): avc: denied { write } for pid=5390 comm="syz-executor6" path="socket:[12549]" dev="sockfs" ino=12549 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1517363995.613:7): avc: denied { getopt } for pid=5390 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1517363995.613:8): avc: denied { setopt } for pid=5390 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1517363995.613:9): avc: denied { getattr } for pid=5390 comm="syz-executor6" path="socket:[12549]" dev="sockfs" ino=12549 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1517363995.813:10): avc: denied { read } for pid=5452 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 IPv4: Oversized IP packet from 172.20.4.14 audit: type=1400 audit(1517363996.483:11): avc: denied { set_context_mgr } for pid=5557 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 IPv4: Oversized IP packet from 172.20.4.14 audit: type=1400 audit(1517363996.523:12): avc: denied { create } for pid=5561 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 binder: 5557:5574 Release 1 refcount change on invalid ref 0 ret -22 binder: 5557:5560 got reply transaction with no transaction stack binder: 5557:5586 Release 1 refcount change on invalid ref 0 ret -22 binder: 5557:5560 transaction failed 29201/-71, size 80-32 line 2921 PF_BRIDGE: RTM_SETLINK with unknown ifindex netlink: 9 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 9 bytes leftover after parsing attributes in process `syz-executor4'. mmap: syz-executor3 (5764) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. netlink: 9 bytes leftover after parsing attributes in process `syz-executor4'. binder: 5793:5795 IncRefs 0 refcount change on invalid ref 0 ret -22 binder: 5793:5795 ioctl c0306201 20a20000 returned -14 binder: 5964:5974 DecRefs 0 refcount change on invalid ref 4 ret -22 binder_alloc: binder_alloc_mmap_handler: 5969 20000000-20002000 already mapped failed -16 capability: warning: `syz-executor7' uses deprecated v2 capabilities in a way that may be insecure binder: BINDER_SET_CONTEXT_MGR already set binder: 5964:5995 DecRefs 0 refcount change on invalid ref 4 ret -22 binder_alloc: 5964: binder_alloc_buf, no vma binder: 5964:5974 transaction failed 29189/-3, size 80-16 line 3128 binder: 5964:6003 ioctl 40046207 0 returned -16 binder: release 5964:5974 transaction 4 out, still active binder: unexpected work type, 4, not freed binder: unexpected work type, 4, not freed binder: undelivered TRANSACTION_COMPLETE binder: 6031:6034 DecRefs 0 refcount change on invalid ref 4 ret -22 binder: send failed reply for transaction 4, target dead binder: release 6031:6034 transaction 11 out, still active binder: unexpected work type, 4, not freed binder: unexpected work type, 4, not freed binder: undelivered TRANSACTION_COMPLETE binder: send failed reply for transaction 11, target dead binder: undelivered TRANSACTION_ERROR: 29189 syz-executor6 uses obsolete (PF_INET,SOCK_PACKET) binder: 6198:6200 BC_CLEAR_DEATH_NOTIFICATION death notification cookie mismatch 0000000000000000 != fffffffffffffffc binder: 6198:6200 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder: 6198:6212 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=43107 sclass=netlink_audit_socket IPv4: Oversized IP packet from 127.0.0.1 device syz3 entered promiscuous mode device syz3 left promiscuous mode audit_printk_skb: 15 callbacks suppressed device syz3 entered promiscuous mode audit: type=1400 audit(1517364001.213:18): avc: denied { setopt } for pid=6560 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1517364001.233:19): avc: denied { getopt } for pid=6560 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1517364001.263:20): avc: denied { read } for pid=6560 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 device syz3 left promiscuous mode device syz4 entered promiscuous mode device syz4 left promiscuous mode device syz4 entered promiscuous mode device syz4 left promiscuous mode binder: BINDER_SET_CONTEXT_MGR already set binder: 6689:6693 ioctl 40046207 0 returned -16 binder: 6689:6690 ioctl 4b3b 2020d000 returned -22 binder_alloc: 6689: binder_alloc_buf, no vma binder: 6689:6693 transaction failed 29189/-3, size 0-0 line 3128 binder: undelivered TRANSACTION_ERROR: 29189 syz-executor2 (6778) used greatest stack depth: 23016 bytes left TCP: request_sock_TCPv6: Possible SYN flooding on port 20018. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20018. Sending cookies. Check SNMP counters. device gre0 entered promiscuous mode TCP: request_sock_TCPv6: Possible SYN flooding on port 20014. Sending cookies. Check SNMP counters. device gre0 entered promiscuous mode binder: 6964:6988 BC_FREE_BUFFER u0000000020000000 no match binder: BINDER_SET_CONTEXT_MGR already set binder: 6964:6995 BC_FREE_BUFFER u0000000020000000 no match binder: 6964:6988 ioctl 40046207 0 returned -16 audit: type=1400 audit(1517364002.983:21): avc: denied { setattr } for pid=7002 comm="syz-executor4" name="stack" dev="proc" ino=14572 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 binder: BINDER_SET_CONTEXT_MGR already set binder: 6998:7009 ioctl 40046207 0 returned -16 binder: 7008:7024 BC_FREE_BUFFER uffffffffffffffff no match binder: 6998:7028 BC_FREE_BUFFER u0000000020000000 no match SELinux: policydb string length 65224 does not match expected length 8 SELinux: policydb string length 65224 does not match expected length 8 l2tp_core: tunl 2: fd 19 wrong protocol, got 1, expected 17 l2tp_core: tunl 2: fd 19 wrong protocol, got 1, expected 17 binder: 7178:7196 Acquire 1 refcount change on invalid ref 0 ret -22 binder: 7178:7196 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 IPv4: Oversized IP packet from 127.0.0.1 audit: type=1400 audit(1517364004.843:22): avc: denied { ioctl } for pid=7427 comm="syz-executor6" path="socket:[14008]" dev="sockfs" ino=14008 ioctlcmd=4c82 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1