audit: type=1400 audit(1566087434.838:37): avc: denied { set_context_mgr } for pid=6702 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 audit: type=1400 audit(1566087434.868:38): avc: denied { call } for pid=6702 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 ------------[ cut here ]------------ kernel BUG at drivers/android/binder_alloc.c:1108! invalid opcode: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 6705 Comm: syz-executor.2 Not tainted 4.9.189+ #2 task: 00000000af136364 task.stack: 00000000211f1512 RIP: 0010:[] [<00000000f30b6a74>] binder_alloc_do_buffer_copy+0xcb/0x500 drivers/android/binder_alloc.c:1108 RSP: 0018:ffff8801d5c3f4a8 EFLAGS: 00010212 RAX: 0000000000040000 RBX: 0000000020ffc000 RCX: ffffc90000134000 RDX: 00000000000326ba RSI: ffffffff82238cbb RDI: ffff8801c8393b58 RBP: ffff8801d5c3f528 R08: ffff8801d5c3f5a8 R09: 0000000000000008 R10: ffffed003ab87f12 R11: ffff8801d5c3f897 R12: 0000000000000070 R13: 00000000000000a0 R14: 0000000000000008 R15: ffff8801d5c3f5a8 FS: 00007fed813c2700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd751547000 CR3: 00000001cff4f000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffffffff81249481 ffff8801d5c3f568 0000000000000246 0000000020000280 ffff8801c91a2028 ffff8801c8393ad8 00ff8801d5c3f870 ffff8801c8393a80 ffffffff814fd8d6 ffff8801d512f800 00000000000000a0 ffff8801d5c3f5a8 Call Trace: [<000000008befaeaf>] binder_alloc_copy_from_buffer+0x37/0x42 drivers/android/binder_alloc.c:1154 [<00000000b5ca7bb1>] binder_validate_ptr+0xc5/0x1b0 drivers/android/binder.c:2335 [<000000004a2c4818>] binder_transaction+0x20a4/0x5890 drivers/android/binder.c:3444 [<000000001a835f7d>] binder_thread_write+0x730/0x20e0 drivers/android/binder.c:3906 [<00000000a8911a1c>] binder_ioctl_write_read drivers/android/binder.c:4854 [inline] [<00000000a8911a1c>] binder_ioctl+0xecd/0x1720 drivers/android/binder.c:5030 [<00000000cd682c70>] vfs_ioctl fs/ioctl.c:43 [inline] [<00000000cd682c70>] file_ioctl fs/ioctl.c:493 [inline] [<00000000cd682c70>] do_vfs_ioctl+0xb87/0x11d0 fs/ioctl.c:677 [<000000005076375f>] SYSC_ioctl fs/ioctl.c:694 [inline] [<000000005076375f>] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:685 [<00000000baa5f71c>] do_syscall_64+0x1ad/0x5c0 arch/x86/entry/common.c:288 [<0000000052d1a53f>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 0a 04 00 00 4d 8b 64 24 58 49 29 dc e8 bf 96 0e ff 4d 39 e6 76 07 e8 b5 96 0e ff <0f> 0b e8 ae 96 0e ff 4c 8b 6d d0 4d 29 f4 4d 39 e5 77 e8 e8 9d RIP [<00000000f30b6a74>] binder_alloc_do_buffer_copy+0xcb/0x500 drivers/android/binder_alloc.c:1108 RSP ---[ end trace 0fa9f20d58b30f13 ]---