FAULT_FLAG_ALLOW_RETRY missing 31 CPU: 1 PID: 18349 Comm: syz-executor2 Not tainted 4.4.119-g024f962 #26 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 8602ea26e743d9b8 ffff8800aa2779f0 ffffffff81d0402d ffff8800bb9fe780[ 125.057920] BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor1/18356 caller is __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 1ffff1001544ef4b ffff8800aa277b78 0000000000000000 0000000000000000 ffff8800aa277ba0 ffffffff816072a5 ffff8800aa277a48 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] handle_userfault+0x715/0xf50 fs/userfaultfd.c:316 [] do_anonymous_page mm/memory.c:2731 [inline] [] handle_pte_fault mm/memory.c:3295 [inline] [] __handle_mm_fault mm/memory.c:3426 [inline] [] handle_mm_fault+0x2938/0x3190 mm/memory.c:3455 [] __do_page_fault+0x35b/0xa00 arch/x86/mm/fault.c:1245 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1308 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1033 [] SyS_sysinfo+0x15/0x20 kernel/sys.c:2531 [] entry_SYSCALL_64_fastpath+0x1c/0x98 CPU: 0 PID: 18356 Comm: syz-executor1 Not tainted 4.4.119-g024f962 #26 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 b3efee1932e9a7e3 ffff8801d94af638 ffffffff81d0402d 0000000000000000 ffffffff839fe5a0 ffffffff83cefc20 ffff8800bb271800 0000000000000003 ffff8801d94af678 ffffffff81d63f84 ffff8801c5bd7d48 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] check_preemption_disabled+0x1d4/0x200 lib/smp_processor_id.c:46 [] __this_cpu_preempt_check+0x1c/0x20 lib/smp_processor_id.c:62 [] tcp_try_coalesce+0x249/0x4d0 net/ipv4/tcp_input.c:4278 [] tcp_queue_rcv+0x127/0x720 net/ipv4/tcp_input.c:4485 [] tcp_send_rcvq+0x39b/0x450 net/ipv4/tcp_input.c:4531 [] tcp_sendmsg+0x1e8f/0x2b10 net/ipv4/tcp.c:1134 [] inet_sendmsg+0x2bc/0x4c0 net/ipv4/af_inet.c:755 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xca/0x110 net/socket.c:635 [] sock_write_iter+0x226/0x3b0 net/socket.c:834 [] do_iter_readv_writev+0x138/0x1e0 fs/read_write.c:664 [] do_readv_writev+0x2d2/0x6e0 fs/read_write.c:808 [] vfs_writev+0x7b/0xb0 fs/read_write.c:847 [] SYSC_writev fs/read_write.c:880 [inline] [] SyS_writev+0xd9/0x240 fs/read_write.c:872 [] entry_SYSCALL_64_fastpath+0x1c/0x98 audit: type=1401 audit(1519929017.135:158): op=setxattr invalid_context="" audit: type=1401 audit(1519929017.195:159): op=setxattr invalid_context="" netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. audit: type=1400 audit(1519929018.385:160): avc: denied { create } for pid=18507 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 audit: type=1400 audit(1519929018.455:161): avc: denied { create } for pid=18512 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1519929018.455:162): avc: denied { set_context_mgr } for pid=18511 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 audit: type=1400 audit(1519929018.455:163): avc: denied { call } for pid=18511 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 binder: 18511:18515 transaction failed 29201/-28, size 0-0 line 3128 binder: BINDER_SET_CONTEXT_MGR already set binder: 18511:18515 ioctl 40046207 0 returned -16 audit: type=1400 audit(1519929018.455:164): avc: denied { create } for pid=18507 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 audit: type=1400 audit(1519929018.545:165): avc: denied { create } for pid=18512 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 binder: undelivered TRANSACTION_ERROR: 29201 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4096 sclass=netlink_route_socket SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4096 sclass=netlink_route_socket netlink: 100 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 100 bytes leftover after parsing attributes in process `syz-executor6'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33774 sclass=netlink_route_socket SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33774 sclass=netlink_route_socket binder: 19010:19014 unknown command -45617144 binder: 19010:19014 ioctl c0306201 20007000 returned -22 audit_printk_skb: 81 callbacks suppressed audit: type=1400 audit(1519929022.475:193): avc: denied { set_context_mgr } for pid=19010 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 audit: type=1400 audit(1519929023.965:194): avc: denied { create } for pid=19264 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1519929023.975:195): avc: denied { create } for pid=19266 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1519929023.975:196): avc: denied { getattr } for pid=19266 comm="syz-executor0" path="socket:[40354]" dev="sockfs" ino=40354 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1519929024.025:197): avc: denied { create } for pid=19266 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1519929024.025:198): avc: denied { getattr } for pid=19266 comm="syz-executor0" path="socket:[40357]" dev="sockfs" ino=40357 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1519929024.115:199): avc: denied { create } for pid=19264 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1519929024.145:200): avc: denied { write } for pid=19264 comm="syz-executor2" path="socket:[39463]" dev="sockfs" ino=39463 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 device lo entered promiscuous mode device lo left promiscuous mode audit: type=1400 audit(1519929024.185:201): avc: denied { write } for pid=19264 comm="syz-executor2" path="socket:[40379]" dev="sockfs" ino=40379 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1519929024.225:202): avc: denied { getopt } for pid=19264 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. device lo entered promiscuous mode device lo left promiscuous mode netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. device syz_tun entered promiscuous mode device syz_tun left promiscuous mode device syz_tun entered promiscuous mode device syz_tun left promiscuous mode