device gre0 entered promiscuous mode BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor4/30418 caller is __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62 CPU: 1 PID: 30418 Comm: syz-executor4 Not tainted 4.4.105-g8a53962 #3 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 6250f7a3976e64f9 ffff8800b4dff5e0 ffffffff81cc9b0f 0000000000000001 ffffffff839fd4a0 ffff8800b4dff620 ffffffff81d28d18 ffffffff83ced1a0 1ffff100169bfecb ffff8801d5916900 ffff8801d5916240 Call Trace: [] __dump_stack /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:15 [inline] [] dump_stack+0x8e/0xcf /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:51 [] check_preemption_disabled+0x1b8/0x1f0 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:46 [] __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62 [] tcp_try_coalesce+0x200/0x4b0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4278 [] tcp_queue_rcv+0xfe/0x720 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4485 [] tcp_send_rcvq+0x391/0x4a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4531 [] tcp_sendmsg+0x1d1c/0x36a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp.c:1134 [] inet_sendmsg+0x26c/0x430 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/af_inet.c:755 [] sock_sendmsg_nosec /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:625 [inline] [] sock_sendmsg+0xb5/0xf0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:635 [] ___sys_sendmsg+0x2bd/0x7d0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:1961 [] __sys_sendmmsg+0xf5/0x260 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2046 [] SYSC_sendmmsg /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2076 [inline] [] SyS_sendmmsg+0xd/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2071 [] entry_SYSCALL_64_fastpath+0x16/0x76 netlink: 1 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor6'. device gre0 entered promiscuous mode device gre0 entered promiscuous mode TCP: request_sock_TCP: Possible SYN flooding on port 20001. Sending cookies. Check SNMP counters. device gre0 entered promiscuous mode BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor6/31041 caller is __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62 CPU: 0 PID: 31041 Comm: syz-executor6 Not tainted 4.4.105-g8a53962 #3 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 6591e13489d2e5db ffff8801d615f5e0 ffffffff81cc9b0f 0000000000000000 ffffffff839fd4a0 ffff8801d615f620 ffffffff81d28d18 ffffffff83ced1a0 1ffff1003ac2becb ffff8800b92bc000 ffff8800b92bdb00 Call Trace: [] __dump_stack /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:15 [inline] [] dump_stack+0x8e/0xcf /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:51 [] check_preemption_disabled+0x1b8/0x1f0 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:46 [] __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62 [] tcp_try_coalesce+0x200/0x4b0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4278 [] tcp_queue_rcv+0xfe/0x720 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4485 [] tcp_send_rcvq+0x391/0x4a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4531 [] tcp_sendmsg+0x1d1c/0x36a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp.c:1134 [] inet_sendmsg+0x26c/0x430 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/af_inet.c:755 [] sock_sendmsg_nosec /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:625 [inline] [] sock_sendmsg+0xb5/0xf0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:635 [] ___sys_sendmsg+0x2bd/0x7d0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:1961 [] __sys_sendmmsg+0xf5/0x260 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2046 [] SYSC_sendmmsg /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2076 [inline] [] SyS_sendmmsg+0xd/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2071 [] entry_SYSCALL_64_fastpath+0x16/0x76 netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. device gre0 entered promiscuous mode netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. TCP: request_sock_TCP: Possible SYN flooding on port 20017. Sending cookies. Check SNMP counters. netlink: 1 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor1'. TCP: request_sock_TCP: Possible SYN flooding on port 20009. Sending cookies. Check SNMP counters. netlink: 17 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 17 bytes leftover after parsing attributes in process `syz-executor0'. device gre0 entered promiscuous mode kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory accessgeneral protection fault: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 32330 Comm: syz-executor3 Not tainted 4.4.105-g8a53962 #3 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8801d7292f80 task.stack: ffff8801d3fe8000 RIP: 0010:[] [] netlink_getsockbyportid /syzkaller/managers/android-44-kasan-gce/kernel/net/netlink/af_netlink.c:1058 [inline] RIP: 0010:[] [] netlink_unicast+0x18f/0x760 /syzkaller/managers/android-44-kasan-gce/kernel/net/netlink/af_netlink.c:1243 RSP: 0000:ffff8801d3fef788 EFLAGS: 00010286 RAX: dffffc0000000048 RBX: 0000000000000000 RCX: 0000000000000030 RDX: 1ffff1003a5e0ea3 RSI: 00000000024000c0 RDI: ffff8801d2f07518 RBP: ffff8801d3fef850 R08: 0000000000000003 R09: ffffed003a332ccc R10: ffff8801d1996667 R11: ffffed003a332ccd R12: dffffc0000000000 R13: ffff8801d2f07440 R14: 0000000000000040 R15: ffff8801d3fef828 FS: 00007fb3582e5700(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f28b07ff000 CR3: 00000001d5b3f000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffff8801d1996700 1ffff1003a7fdef9 0000000000000240 0000000000000030 1ffff1003a7fdef9 dffffc0000000006 dffffc0000000048 ffff8801000027f3 0000000041b58ab3 ffffffff83ffca2e ffffffff82f30f30 ffffffff814daa66 Call Trace: [] netlink_ack+0x203/0x480 /syzkaller/managers/android-44-kasan-gce/kernel/net/netlink/af_netlink.c:2278 [] nfnetlink_rcv_batch /syzkaller/managers/android-44-kasan-gce/kernel/net/netfilter/nfnetlink.c:319 [inline] [] nfnetlink_rcv+0x953/0xfe0 /syzkaller/managers/android-44-kasan-gce/kernel/net/netfilter/nfnetlink.c:477 [] netlink_unicast_kernel /syzkaller/managers/android-44-kasan-gce/kernel/net/netlink/af_netlink.c:1223 [inline] [] netlink_unicast+0x4c5/0x760 /syzkaller/managers/android-44-kasan-gce/kernel/net/netlink/af_netlink.c:1249 [] netlink_sendmsg+0x832/0xbc0 /syzkaller/managers/android-44-kasan-gce/kernel/net/netlink/af_netlink.c:1803 [] sock_sendmsg_nosec /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:625 [inline] [] sock_sendmsg+0xb5/0xf0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:635 [] ___sys_sendmsg+0x66d/0x7d0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:1961 [] __sys_sendmsg+0xc3/0x160 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:1995 [] SYSC_sendmsg /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2006 [inline] [] SyS_sendmsg+0xd/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2002 [] entry_SYSCALL_64_fastpath+0x16/0x76 Code: ff 85 c0 0f 85 91 03 00 00 49 8d 57 c0 48 89 d9 4c 89 ee 4c 89 f7 e8 71 f6 ff ff 83 f8 01 0f 85 c4 03 00 00 48 8b 85 68 ff ff ff <0f> b6 00 84 c0 74 08 3c 03 0f 8e 90 05 00 00 48 8b 85 60 ff ff RIP [] netlink_getsockbyportid /syzkaller/managers/android-44-kasan-gce/kernel/net/netlink/af_netlink.c:1058 [inline] RIP [] netlink_unicast+0x18f/0x760 /syzkaller/managers/android-44-kasan-gce/kernel/net/netlink/af_netlink.c:1243 RSP ---[ end trace aaf2044bc3759e21 ]---