device lo entered promiscuous mode
BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor5/6777
caller is __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62
CPU: 0 PID: 6777 Comm: syz-executor5 Not tainted 4.4.105-g8a53962 #3
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 0000000000000000 cd7439b5da0d94af ffff8801d30af5e0 ffffffff81cc9b0f
 0000000000000000 ffffffff839fd4a0 ffff8801d30af620 ffffffff81d28d18
 ffffffff83ced1a0 1ffff1003a615ecb ffff8800b88c4240 ffff8800b88c4900
Call Trace:
 [<ffffffff81cc9b0f>] __dump_stack /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:15 [inline]
 [<ffffffff81cc9b0f>] dump_stack+0x8e/0xcf /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:51
 [<ffffffff81d28d18>] check_preemption_disabled+0x1b8/0x1f0 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:46
 [<ffffffff81d28d83>] __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62
 [<ffffffff830dc140>] tcp_try_coalesce+0x200/0x4b0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4278
 [<ffffffff830e5c2e>] tcp_queue_rcv+0xfe/0x720 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4485
 [<ffffffff830ffe91>] tcp_send_rcvq+0x391/0x4a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4531
 [<ffffffff830d208c>] tcp_sendmsg+0x1d1c/0x36a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp.c:1134
BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor2/6816
caller is __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62
 [<ffffffff8319020c>] inet_sendmsg+0x26c/0x430 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/af_inet.c:755
 [<ffffffff82d93fc5>] sock_sendmsg_nosec /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:625 [inline]
 [<ffffffff82d93fc5>] sock_sendmsg+0xb5/0xf0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:635
 [<ffffffff82d956ed>] ___sys_sendmsg+0x2bd/0x7d0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:1961
 [<ffffffff82d979d5>] __sys_sendmmsg+0xf5/0x260 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2046
 [<ffffffff82d97b4d>] SYSC_sendmmsg /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2076 [inline]
 [<ffffffff82d97b4d>] SyS_sendmmsg+0xd/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2071
 [<ffffffff8374aaf6>] entry_SYSCALL_64_fastpath+0x16/0x76
CPU: 1 PID: 6816 Comm: syz-executor2 Not tainted 4.4.105-g8a53962 #3
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 0000000000000000 3793ad08ab0725c7 ffff8801d15375e0 ffffffff81cc9b0f
 0000000000000001 ffffffff839fd4a0 ffff8801d1537620 ffffffff81d28d18
 ffffffff83ced1a0 1ffff1003a2a6ecb ffff8800b88c4b40 ffff8800b88c5440
Call Trace:
 [<ffffffff81cc9b0f>] __dump_stack /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:15 [inline]
 [<ffffffff81cc9b0f>] dump_stack+0x8e/0xcf /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:51
 [<ffffffff81d28d18>] check_preemption_disabled+0x1b8/0x1f0 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:46
 [<ffffffff81d28d83>] __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62
 [<ffffffff830dc140>] tcp_try_coalesce+0x200/0x4b0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4278
 [<ffffffff830e5c2e>] tcp_queue_rcv+0xfe/0x720 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4485
 [<ffffffff830ffe91>] tcp_send_rcvq+0x391/0x4a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4531
 [<ffffffff830d208c>] tcp_sendmsg+0x1d1c/0x36a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp.c:1134
 [<ffffffff8319020c>] inet_sendmsg+0x26c/0x430 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/af_inet.c:755
 [<ffffffff82d93fc5>] sock_sendmsg_nosec /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:625 [inline]
 [<ffffffff82d93fc5>] sock_sendmsg+0xb5/0xf0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:635
 [<ffffffff82d956ed>] ___sys_sendmsg+0x2bd/0x7d0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:1961
 [<ffffffff82d979d5>] __sys_sendmmsg+0xf5/0x260 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2046
 [<ffffffff82d97b4d>] SYSC_sendmmsg /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2076 [inline]
 [<ffffffff82d97b4d>] SyS_sendmmsg+0xd/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2071
 [<ffffffff8374aaf6>] entry_SYSCALL_64_fastpath+0x16/0x76
device gre0 entered promiscuous mode
device gre0 entered promiscuous mode
nla_parse: 2 callbacks suppressed
netlink: 11 bytes leftover after parsing attributes in process `syz-executor7'.
audit: type=1400 audit(1512961490.489:21): avc:  denied  { accept } for  pid=7111 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1
netlink: 11 bytes leftover after parsing attributes in process `syz-executor7'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
audit: type=1400 audit(1512961491.549:22): avc:  denied  { setopt } for  pid=7366 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
audit: type=1400 audit(1512961491.679:23): avc:  denied  { connect } for  pid=7450 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1
audit: type=1400 audit(1512961491.739:24): avc:  denied  { getattr } for  pid=7470 comm="syz-executor0" name="NETLINK" dev="sockfs" ino=14281 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
device lo entered promiscuous mode
qtaguid: iface_stat: iface_check_stats_reset_and_adjust(lo): iface reset its stats unexpectedly
device gre0 entered promiscuous mode
device lo entered promiscuous mode
device gre0 entered promiscuous mode
device gre0 entered promiscuous mode
device gre0 entered promiscuous mode
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=26 sclass=netlink_audit_socket
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=26 sclass=netlink_audit_socket
device gre0 entered promiscuous mode
audit_printk_skb: 3 callbacks suppressed
audit: type=1400 audit(1512961494.079:26): avc:  denied  { accept } for  pid=8183 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1
BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor3/8236
caller is __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62
CPU: 0 PID: 8236 Comm: syz-executor3 Not tainted 4.4.105-g8a53962 #3
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 0000000000000000 125bc4fe81ad338a ffff8801d60bf5e0 ffffffff81cc9b0f
 0000000000000000 ffffffff839fd4a0 ffff8801d60bf620 ffffffff81d28d18
 ffffffff83ced1a0 1ffff1003ac17ecb ffff8801d4e5b8c0 ffff8801d4e5ad80
Call Trace:
 [<ffffffff81cc9b0f>] __dump_stack /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:15 [inline]
 [<ffffffff81cc9b0f>] dump_stack+0x8e/0xcf /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:51
 [<ffffffff81d28d18>] check_preemption_disabled+0x1b8/0x1f0 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:46
 [<ffffffff81d28d83>] __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62
 [<ffffffff830dc140>] tcp_try_coalesce+0x200/0x4b0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4278
 [<ffffffff830e5c2e>] tcp_queue_rcv+0xfe/0x720 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4485
 [<ffffffff830ffe91>] tcp_send_rcvq+0x391/0x4a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4531
 [<ffffffff830d208c>] tcp_sendmsg+0x1d1c/0x36a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp.c:1134
 [<ffffffff8319020c>] inet_sendmsg+0x26c/0x430 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/af_inet.c:755
 [<ffffffff82d93fc5>] sock_sendmsg_nosec /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:625 [inline]
 [<ffffffff82d93fc5>] sock_sendmsg+0xb5/0xf0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:635
 [<ffffffff82d956ed>] ___sys_sendmsg+0x2bd/0x7d0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:1961
audit: type=1400 audit(1512961494.519:27): avc:  denied  { shutdown } for  pid=8257 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1
 [<ffffffff82d979d5>] __sys_sendmmsg+0xf5/0x260 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2046
 [<ffffffff82d97b4d>] SYSC_sendmmsg /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2076 [inline]
 [<ffffffff82d97b4d>] SyS_sendmmsg+0xd/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2071
 [<ffffffff8374aaf6>] entry_SYSCALL_64_fastpath+0x16/0x76
audit: type=1400 audit(1512961495.449:28): avc:  denied  { create } for  pid=8564 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1
SELinux: unrecognized netlink message: protocol=4 nlmsg_type=514 sclass=netlink_tcpdiag_socket
audit: type=1400 audit(1512961495.589:29): avc:  denied  { create } for  pid=8631 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1
BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor5/8681
caller is __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62
CPU: 1 PID: 8681 Comm: syz-executor5 Not tainted 4.4.105-g8a53962 #3
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 0000000000000000 44b6a0b7dd992f31 ffff8800ac1ff5e0 ffffffff81cc9b0f
 0000000000000001 ffffffff839fd4a0 ffff8800ac1ff620 ffffffff81d28d18
 ffffffff83ced1a0 1ffff1001583fecb ffff8801d4e5ab40 ffff8801d4e5a240
Call Trace:
 [<ffffffff81cc9b0f>] __dump_stack /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:15 [inline]
 [<ffffffff81cc9b0f>] dump_stack+0x8e/0xcf /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:51
 [<ffffffff81d28d18>] check_preemption_disabled+0x1b8/0x1f0 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:46
 [<ffffffff81d28d83>] __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62
 [<ffffffff830dc140>] tcp_try_coalesce+0x200/0x4b0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4278
 [<ffffffff830e5c2e>] tcp_queue_rcv+0xfe/0x720 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4485
 [<ffffffff830ffe91>] tcp_send_rcvq+0x391/0x4a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4531
 [<ffffffff830d208c>] tcp_sendmsg+0x1d1c/0x36a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp.c:1134
 [<ffffffff8319020c>] inet_sendmsg+0x26c/0x430 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/af_inet.c:755
 [<ffffffff82d93fc5>] sock_sendmsg_nosec /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:625 [inline]
 [<ffffffff82d93fc5>] sock_sendmsg+0xb5/0xf0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:635
 [<ffffffff82d956ed>] ___sys_sendmsg+0x2bd/0x7d0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:1961
 [<ffffffff82d979d5>] __sys_sendmmsg+0xf5/0x260 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2046
device gre0 entered promiscuous mode
 [<ffffffff82d97b4d>] SYSC_sendmmsg /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2076 [inline]
 [<ffffffff82d97b4d>] SyS_sendmmsg+0xd/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2071
 [<ffffffff8374aaf6>] entry_SYSCALL_64_fastpath+0x16/0x76
device gre0 entered promiscuous mode
device gre0 entered promiscuous mode
netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
device gre0 entered promiscuous mode
BUG: using __this_cpu_add() in preemptible [00000000] code: syz-executor7/9208
caller is __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62
CPU: 1 PID: 9208 Comm: syz-executor7 Not tainted 4.4.105-g8a53962 #3
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
 0000000000000000 883c8e4d50f665f7 ffff8801d41075e0 ffffffff81cc9b0f
 0000000000000001 ffffffff839fd4a0 ffff8801d4107620 ffffffff81d28d18
 ffffffff83ced1a0 1ffff1003a820ecb ffff8800ac1ce240 ffff8800ac1ce480
Call Trace:
 [<ffffffff81cc9b0f>] __dump_stack /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:15 [inline]
 [<ffffffff81cc9b0f>] dump_stack+0x8e/0xcf /syzkaller/managers/android-44-kasan-gce/kernel/lib/dump_stack.c:51
 [<ffffffff81d28d18>] check_preemption_disabled+0x1b8/0x1f0 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:46
 [<ffffffff81d28d83>] __this_cpu_preempt_check+0x13/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/lib/smp_processor_id.c:62
 [<ffffffff830dc140>] tcp_try_coalesce+0x200/0x4b0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4278
 [<ffffffff830e5c2e>] tcp_queue_rcv+0xfe/0x720 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4485
 [<ffffffff830ffe91>] tcp_send_rcvq+0x391/0x4a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp_input.c:4531
 [<ffffffff830d208c>] tcp_sendmsg+0x1d1c/0x36a0 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/tcp.c:1134
 [<ffffffff8319020c>] inet_sendmsg+0x26c/0x430 /syzkaller/managers/android-44-kasan-gce/kernel/net/ipv4/af_inet.c:755
 [<ffffffff82d93fc5>] sock_sendmsg_nosec /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:625 [inline]
 [<ffffffff82d93fc5>] sock_sendmsg+0xb5/0xf0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:635
 [<ffffffff82d956ed>] ___sys_sendmsg+0x2bd/0x7d0 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:1961
 [<ffffffff82d979d5>] __sys_sendmmsg+0xf5/0x260 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2046
 [<ffffffff82d97b4d>] SYSC_sendmmsg /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2076 [inline]
 [<ffffffff82d97b4d>] SyS_sendmmsg+0xd/0x20 /syzkaller/managers/android-44-kasan-gce/kernel/net/socket.c:2071
 [<ffffffff8374aaf6>] entry_SYSCALL_64_fastpath+0x16/0x76
netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'.
audit: type=1400 audit(1512961498.299:30): avc:  denied  { getopt } for  pid=9335 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'.
sock: process `syz-executor2' is using obsolete setsockopt SO_BSDCOMPAT
netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'.