last executing test programs: 6.101702816s ago: executing program 1 (id=103): socket$kcm(0x10, 0x2, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)=@secondary) 5.539724122s ago: executing program 0 (id=106): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) 5.539462502s ago: executing program 0 (id=107): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="150000001000"], 0x50) 5.449598565s ago: executing program 0 (id=108): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mq_open(0x0, 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x6, 0x101}) 5.389616866s ago: executing program 0 (id=109): socket$kcm(0x2, 0xa, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) 628.244922ms ago: executing program 1 (id=110): prlimit64(0x0, 0xe, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') read$FUSE(r0, &(0x7f000000ae80)={0x2020}, 0x2020) pread64(r0, &(0x7f00000002c0)=""/220, 0xdc, 0x0) read$FUSE(r0, &(0x7f0000004b80)={0x2020}, 0x2020) 559.186884ms ago: executing program 1 (id=111): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20020084, &(0x7f00000018c0)={0x2, 0x4e20}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000340)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000340), &(0x7f0000000040)=@tcp=r0}, 0x20) 479.217217ms ago: executing program 1 (id=112): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv4_deladdr={0x2c, 0x15, 0x1, 0x70bd2a, 0x25dfdbfd, {0x2, 0x80, 0x1, 0xff, r2}, [@IFA_LABEL={0x14, 0x3, 'vxcan1\x00'}]}, 0x2c}}, 0x0) 471.048557ms ago: executing program 1 (id=113): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000004"], 0x34}}, 0x0) 369.89796ms ago: executing program 1 (id=114): pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_emit_ethernet(0xd0, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c20000"], 0x0) write$binfmt_misc(r1, &(0x7f0000000000), 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x7fff, 0x0) 49.936409ms ago: executing program 0 (id=115): pipe(&(0x7f00000045c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000002c0)={0x30, 0x5, 0x0, {0x0, 0x4, 0x5, 0x3}}, 0x30) r2 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 0s ago: executing program 0 (id=116): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x4, 0x0, 0x0, 0xe, 0x3}]}}, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000080)={&(0x7f0000000000)=""/120, 0x78}) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000740)={0x0}) kernel console output (not intermixed with test programs): [ 35.084962][ T31] audit: type=1400 audit(35.030:68): avc: denied { read write } for pid=3077 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 35.085471][ T31] audit: type=1400 audit(35.030:69): avc: denied { open } for pid=3077 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:57553' (ED25519) to the list of known hosts. [ 43.790918][ T31] audit: type=1400 audit(43.730:70): avc: denied { name_bind } for pid=3083 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 45.026797][ T31] audit: type=1400 audit(44.970:71): avc: denied { execute } for pid=3085 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 45.051902][ T31] audit: type=1400 audit(45.000:72): avc: denied { execute_no_trans } for pid=3085 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 47.641277][ T31] audit: type=1400 audit(47.590:73): avc: denied { mounton } for pid=3085 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 47.643648][ T31] audit: type=1400 audit(47.590:74): avc: denied { mount } for pid=3085 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 47.652786][ T3085] cgroup: Unknown subsys name 'net' [ 47.656952][ T31] audit: type=1400 audit(47.600:75): avc: denied { unmount } for pid=3085 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 47.819860][ T3085] cgroup: Unknown subsys name 'cpuset' [ 47.823550][ T3085] cgroup: Unknown subsys name 'hugetlb' [ 47.824308][ T3085] cgroup: Unknown subsys name 'rlimit' [ 48.045270][ T31] audit: type=1400 audit(47.990:76): avc: denied { setattr } for pid=3085 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.047134][ T31] audit: type=1400 audit(47.990:77): avc: denied { mounton } for pid=3085 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 48.048399][ T31] audit: type=1400 audit(47.990:78): avc: denied { mount } for pid=3085 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 48.163046][ T3087] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 48.164488][ T31] audit: type=1400 audit(48.110:79): avc: denied { relabelto } for pid=3087 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 52.258811][ T3085] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 53.526812][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 53.526867][ T31] audit: type=1400 audit(53.460:83): avc: denied { execmem } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 53.555600][ T31] audit: type=1400 audit(53.500:84): avc: denied { read } for pid=3090 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 53.556812][ T31] audit: type=1400 audit(53.500:85): avc: denied { open } for pid=3090 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 53.570893][ T31] audit: type=1400 audit(53.510:86): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 53.587177][ T31] audit: type=1400 audit(53.530:87): avc: denied { module_request } for pid=3090 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 53.699529][ T31] audit: type=1400 audit(53.640:88): avc: denied { sys_module } for pid=3090 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 54.155651][ T31] audit: type=1400 audit(54.100:89): avc: denied { ioctl } for pid=3091 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 54.948689][ T3090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.973182][ T3090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.028443][ T3091] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.037517][ T3091] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.583997][ T3090] hsr_slave_0: entered promiscuous mode [ 55.586054][ T3090] hsr_slave_1: entered promiscuous mode [ 55.648806][ T3091] hsr_slave_0: entered promiscuous mode [ 55.651510][ T3091] hsr_slave_1: entered promiscuous mode [ 55.652666][ T3091] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 55.652964][ T3091] Cannot create hsr debugfs directory [ 55.833803][ T31] audit: type=1400 audit(55.780:90): avc: denied { create } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 55.834788][ T31] audit: type=1400 audit(55.780:91): avc: denied { write } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 55.835784][ T31] audit: type=1400 audit(55.780:92): avc: denied { read } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 55.851740][ T3090] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 55.865549][ T3090] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 55.874902][ T3090] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 55.888832][ T3090] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 55.945760][ T3091] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 55.950150][ T3091] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 55.955576][ T3091] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 55.966001][ T3091] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 56.482194][ T3091] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.496797][ T3090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.952899][ T3090] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.262009][ T3091] veth0_vlan: entered promiscuous mode [ 58.277974][ T3091] veth1_vlan: entered promiscuous mode [ 58.309600][ T3091] veth0_macvtap: entered promiscuous mode [ 58.317525][ T3091] veth1_macvtap: entered promiscuous mode [ 58.356209][ T3091] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.356707][ T3091] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.356937][ T3091] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.357108][ T3091] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.516859][ T3091] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 58.525621][ T3090] veth0_vlan: entered promiscuous mode [ 58.545368][ T3090] veth1_vlan: entered promiscuous mode [ 58.564308][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 58.564359][ T31] audit: type=1400 audit(58.510:103): avc: denied { read write } for pid=3091 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 58.568219][ T31] audit: type=1400 audit(58.510:104): avc: denied { open } for pid=3091 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 58.579061][ T31] audit: type=1400 audit(58.520:105): avc: denied { ioctl } for pid=3091 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 58.602429][ T3090] veth0_macvtap: entered promiscuous mode [ 58.607725][ T3090] veth1_macvtap: entered promiscuous mode [ 58.650078][ T3090] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.651085][ T3090] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.651395][ T3090] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.651618][ T3090] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.848479][ T3774] ip6gre1: entered promiscuous mode [ 58.849142][ T3774] ip6gre1: entered allmulticast mode [ 58.986978][ T31] audit: type=1400 audit(58.930:106): avc: denied { create } for pid=3779 comm="syz.0.3" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 58.988884][ T31] audit: type=1400 audit(58.930:107): avc: denied { map } for pid=3779 comm="syz.0.3" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2302 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 58.992054][ T31] audit: type=1400 audit(58.930:108): avc: denied { read write } for pid=3779 comm="syz.0.3" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2302 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 59.059759][ T31] audit: type=1400 audit(59.000:109): avc: denied { create } for pid=3781 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 59.127574][ T3782] Zero length message leads to an empty skb [ 59.205795][ T31] audit: type=1400 audit(59.150:110): avc: denied { prog_load } for pid=3784 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 59.207087][ T31] audit: type=1400 audit(59.150:111): avc: denied { bpf } for pid=3784 comm="syz.0.5" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 60.378237][ T31] audit: type=1400 audit(60.300:112): avc: denied { perfmon } for pid=3786 comm="syz.1.6" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 63.557825][ T3792] cgroup: Unknown subsys name 'cpuset' [ 63.783900][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 63.783993][ T31] audit: type=1400 audit(63.730:114): avc: denied { create } for pid=3793 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 63.810881][ T31] audit: type=1400 audit(63.750:115): avc: denied { create } for pid=3793 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 65.633495][ T31] audit: type=1400 audit(65.580:116): avc: denied { ioctl } for pid=3793 comm="syz.0.7" path="socket:[2326]" dev="sockfs" ino=2326 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.651275][ T31] audit: type=1400 audit(65.580:117): avc: denied { write } for pid=3793 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 78.272829][ T31] audit: type=1400 audit(78.220:118): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 80.571158][ T31] audit: type=1400 audit(80.510:119): avc: denied { name_bind } for pid=3820 comm="syz.0.13" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 80.571686][ T31] audit: type=1400 audit(80.510:120): avc: denied { node_bind } for pid=3820 comm="syz.0.13" saddr=224.0.0.2 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 82.990950][ T31] audit: type=1400 audit(82.930:121): avc: denied { create } for pid=3850 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 82.991861][ T31] audit: type=1400 audit(82.930:122): avc: denied { bind } for pid=3850 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 82.996366][ T31] audit: type=1400 audit(82.940:123): avc: denied { listen } for pid=3850 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 83.008419][ T31] audit: type=1400 audit(82.950:124): avc: denied { connect } for pid=3850 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 83.012026][ T31] audit: type=1400 audit(82.950:125): avc: denied { accept } for pid=3850 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 83.012865][ T31] audit: type=1400 audit(82.960:126): avc: denied { map_create } for pid=3850 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 83.013473][ T31] audit: type=1400 audit(82.960:127): avc: denied { map_read map_write } for pid=3850 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 84.503069][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 84.503123][ T31] audit: type=1326 audit(84.440:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.1.19" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 84.503860][ T31] audit: type=1326 audit(84.450:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.1.19" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 84.507952][ T31] audit: type=1326 audit(84.450:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.1.19" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x133450 code=0x7ffc0000 [ 84.510187][ T31] audit: type=1326 audit(84.450:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.1.19" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 84.515567][ T31] audit: type=1326 audit(84.450:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.1.19" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 84.516364][ T31] audit: type=1326 audit(84.460:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.1.19" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 84.522136][ T31] audit: type=1326 audit(84.470:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.1.19" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 84.522585][ T31] audit: type=1326 audit(84.470:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.1.19" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 84.526724][ T31] audit: type=1326 audit(84.470:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.1.19" exe="/syz-executor" sig=0 arch=40000028 syscall=41 compat=0 ip=0x133450 code=0x7ffc0000 [ 84.527381][ T31] audit: type=1326 audit(84.470:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3855 comm="syz.1.19" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 95.631362][ T8] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 95.780922][ T8] usb 2-1: Using ep0 maxpacket: 32 [ 95.786022][ T8] usb 2-1: config 0 has an invalid interface number: 9 but max is 0 [ 95.786331][ T8] usb 2-1: config 0 has no interface number 0 [ 95.800354][ T8] usb 2-1: New USB device found, idVendor=06a2, idProduct=0003, bcdDevice=b4.8c [ 95.810915][ T8] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 95.811190][ T8] usb 2-1: Product: syz [ 95.811283][ T8] usb 2-1: Manufacturer: syz [ 95.811382][ T8] usb 2-1: SerialNumber: syz [ 95.813932][ T8] usb 2-1: config 0 descriptor?? [ 96.250783][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 96.250845][ T31] audit: type=1400 audit(96.190:164): avc: denied { append } for pid=3871 comm="syz.0.22" name="pcmC0D0p" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 97.314251][ T31] audit: type=1400 audit(97.260:165): avc: denied { create } for pid=3873 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 100.036862][ T31] audit: type=1400 audit(99.980:166): avc: denied { create } for pid=3885 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 101.542793][ T31] audit: type=1400 audit(101.490:167): avc: denied { shutdown } for pid=3885 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 101.544319][ T31] audit: type=1400 audit(101.490:168): avc: denied { getopt } for pid=3885 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 101.544829][ T31] audit: type=1400 audit(101.490:169): avc: denied { connect } for pid=3885 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 101.545203][ T31] audit: type=1400 audit(101.490:170): avc: denied { name_connect } for pid=3885 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 101.559019][ T31] audit: type=1400 audit(101.500:171): avc: denied { setopt } for pid=3885 comm="syz.0.26" lport=37344 faddr=fc02:: scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 106.043993][ T51] usb 2-1: USB disconnect, device number 2 [ 117.072347][ T31] audit: type=1400 audit(117.020:172): avc: denied { create } for pid=3914 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 117.075812][ T31] audit: type=1400 audit(117.020:173): avc: denied { write } for pid=3914 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 117.440986][ T8] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 117.608817][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 117.609181][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 117.609667][ T8] usb 2-1: New USB device found, idVendor=1e7d, idProduct=2cf6, bcdDevice= 0.00 [ 117.610006][ T8] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 117.618711][ T8] usb 2-1: config 0 descriptor?? [ 118.047627][ T8] pyra 0003:1E7D:2CF6.0001: item fetching failed at offset 5/7 [ 118.048148][ T8] pyra 0003:1E7D:2CF6.0001: parse failed [ 118.048386][ T8] pyra 0003:1E7D:2CF6.0001: probe with driver pyra failed with error -22 [ 118.247364][ T3692] usb 2-1: USB disconnect, device number 3 [ 118.332551][ T31] audit: type=1400 audit(118.280:174): avc: denied { write } for pid=3937 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 118.334809][ T31] audit: type=1400 audit(118.280:175): avc: denied { nlmsg_read } for pid=3937 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 118.472452][ T31] audit: type=1400 audit(118.420:176): avc: denied { create } for pid=3939 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 118.474647][ T31] audit: type=1400 audit(118.420:177): avc: denied { setopt } for pid=3939 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 118.673304][ T3940] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 118.673293][ T31] audit: type=1400 audit(118.620:178): avc: denied { create } for pid=3939 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 118.679908][ T31] audit: type=1400 audit(118.620:179): avc: denied { ioctl } for pid=3939 comm="syz.1.37" path="socket:[2483]" dev="sockfs" ino=2483 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 118.689062][ T31] audit: type=1400 audit(118.630:180): avc: denied { bind } for pid=3939 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 121.314655][ T31] audit: type=1400 audit(121.260:181): avc: denied { create } for pid=3955 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 126.483231][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 126.483294][ T31] audit: type=1400 audit(126.430:184): avc: denied { execute } for pid=3965 comm="syz.1.47" path=2F6D656D66643A1033717D329ACEAF0386E7C0148FF8D238F41CC0F91CA6AB0869E45ED5FDA90DAC374194EBCD09202864656C6574656429 dev="tmpfs" ino=1036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 127.000899][ T31] audit: type=1400 audit(126.940:185): avc: denied { read } for pid=3976 comm="syz.0.51" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 127.002150][ T31] audit: type=1400 audit(126.940:186): avc: denied { open } for pid=3976 comm="syz.0.51" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 127.013837][ T31] audit: type=1400 audit(126.950:187): avc: denied { ioctl } for pid=3976 comm="syz.0.51" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 130.821107][ T8] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 130.982842][ T8] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 130.983419][ T8] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 130.983768][ T8] usb 1-1: Product: syz [ 130.984000][ T8] usb 1-1: Manufacturer: syz [ 130.984247][ T8] usb 1-1: SerialNumber: syz [ 135.662466][ T31] audit: type=1400 audit(135.610:188): avc: denied { create } for pid=4001 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 135.669211][ T31] audit: type=1400 audit(135.610:189): avc: denied { bind } for pid=4001 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 135.687004][ T31] audit: type=1400 audit(135.630:190): avc: denied { accept } for pid=4001 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 140.590263][ T3692] usb 1-1: USB disconnect, device number 2 [ 144.261856][ T31] audit: type=1400 audit(144.210:191): avc: denied { create } for pid=4022 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 145.187034][ T31] audit: type=1400 audit(145.130:192): avc: denied { connect } for pid=4024 comm="syz.0.63" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 145.191027][ T31] audit: type=1400 audit(145.130:193): avc: denied { write } for pid=4024 comm="syz.0.63" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 146.273107][ T31] audit: type=1400 audit(146.220:194): avc: denied { write } for pid=4022 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 146.281010][ T31] audit: type=1400 audit(146.220:195): avc: denied { create } for pid=4022 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 146.289652][ T31] audit: type=1400 audit(146.230:196): avc: denied { connect } for pid=4022 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 147.330764][ T31] audit: type=1400 audit(147.130:197): avc: denied { ioctl } for pid=4029 comm="syz.0.65" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2574 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 147.359446][ T31] audit: type=1400 audit(147.170:198): avc: denied { setopt } for pid=4029 comm="syz.0.65" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 150.272667][ T4041] serio: Serial port ptm0 [ 156.231457][ T4047] capability: warning: `syz.1.69' uses deprecated v2 capabilities in a way that may be insecure [ 158.621667][ T4051] binder: 4048:4051 ioctl c018620c 20000240 returned -1 [ 161.865587][ T31] audit: type=1400 audit(161.810:199): avc: denied { mount } for pid=4054 comm="syz.0.72" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 161.873012][ T31] audit: type=1400 audit(161.820:200): avc: denied { remount } for pid=4054 comm="syz.0.72" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 166.687012][ T31] audit: type=1400 audit(166.630:201): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 170.773098][ T4081] netlink: 16255 bytes leftover after parsing attributes in process `syz.0.82'. [ 170.831017][ T31] audit: type=1400 audit(170.770:202): avc: denied { nlmsg_read } for pid=4082 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 178.842482][ T31] audit: type=1326 audit(178.780:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4090 comm="syz.1.85" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 182.201408][ T31] audit: type=1400 audit(182.150:204): avc: denied { mounton } for pid=4100 comm="syz.0.88" path="/50/file0" dev="tmpfs" ino=275 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 185.698166][ T4121] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 185.971018][ T4130] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 190.083423][ T31] audit: type=1400 audit(2000000004.250:205): avc: denied { create } for pid=4132 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 195.772685][ T4156] syz.0.109 uses obsolete (PF_INET,SOCK_PACKET) [ 200.758074][ T4168] netlink: 32 bytes leftover after parsing attributes in process `syz.1.113'. [ 201.122557][ T31] audit: type=1400 audit(2000000015.290:206): avc: denied { bind } for pid=4171 comm="syz.0.115" lport=127 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 201.123862][ T31] audit: type=1400 audit(2000000015.290:207): avc: denied { node_bind } for pid=4171 comm="syz.0.115" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 201.181804][ T4174] usercopy: Kernel memory overwrite attempt detected to SLUB object 'task_struct' (offset 80, size 116)! [ 201.182985][ T4174] ------------[ cut here ]------------ [ 201.183747][ T4174] kernel BUG at mm/usercopy.c:102! [ 201.184228][ T4174] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM [ 201.184777][ T4174] Modules linked in: [ 201.185669][ T4174] CPU: 0 UID: 0 PID: 4174 Comm: syz.0.116 Not tainted 6.12.0-syzkaller #0 [ 201.186300][ T4174] Hardware name: ARM-Versatile Express [ 201.186622][ T4174] PC is at usercopy_abort+0x98/0x9c [ 201.188369][ T4174] LR is at __wake_up_klogd.part.0+0x7c/0xac [ 201.188573][ T4174] pc : [<819be580>] lr : [<802be434>] psr: 60000013 [ 201.188771][ T4174] sp : dfb1dd90 ip : dfb1dcd0 fp : dfb1ddb4 [ 201.188958][ T4174] r10: 81a00568 r9 : 00000078 r8 : 834b9850 [ 201.189145][ T4174] r7 : dde6f9e0 r6 : 00000000 r5 : 00000074 r4 : 00000050 [ 201.189351][ T4174] r3 : 834ba400 r2 : 00000000 r1 : 00000000 r0 : 00000066 [ 201.189561][ T4174] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 201.189751][ T4174] Control: 30c5387d Table: 85078dc0 DAC: fffffffd [ 201.189962][ T4174] Register r0 information: non-paged memory [ 201.190398][ T4174] Register r1 information: NULL pointer [ 201.190718][ T4174] Register r2 information: NULL pointer [ 201.190849][ T4174] Register r3 information: slab task_struct start 834ba400 pointer offset 0 size 3072 [ 201.191537][ T4174] Register r4 information: non-paged memory [ 201.191680][ T4174] Register r5 information: non-paged memory [ 201.191802][ T4174] Register r6 information: NULL pointer [ 201.191926][ T4174] Register r7 information: non-slab/vmalloc memory [ 201.192130][ T4174] Register r8 information: slab task_struct start 834b9800 pointer offset 80 size 3072 [ 201.192359][ T4174] Register r9 information: non-paged memory [ 201.192493][ T4174] Register r10 information: non-slab/vmalloc memory [ 201.192637][ T4174] Register r11 information: 2-page vmalloc region starting at 0xdfb1c000 allocated at kernel_clone+0xac/0x3e4 [ 201.192931][ T4174] Register r12 information: 2-page vmalloc region starting at 0xdfb1c000 allocated at kernel_clone+0xac/0x3e4 [ 201.193181][ T4174] Process syz.0.116 (pid: 4174, stack limit = 0xdfb1c000) [ 201.193502][ T4174] Stack: (0xdfb1dd90 to 0xdfb1e000) [ 201.193711][ T4174] dd80: 8205f678 82030fcc 820464dc 00000050 [ 201.193892][ T4174] dda0: 00000074 00000078 dfb1dde4 dfb1ddb8 804d5d54 819be4f4 00000074 dfb1ddc8 [ 201.194113][ T4174] ddc0: 80214800 834b9850 00000074 00000000 834b98c4 dde6f9e0 dfb1de1c dfb1dde8 [ 201.194501][ T4174] dde0: 80514b34 804d5c88 00000074 20000084 dfb1de0c 834b9850 00000074 20000084 [ 201.194909][ T4174] de00: 00000074 81a005a0 00000078 81a00568 dfb1de4c dfb1de20 80209db4 805148b8 [ 201.195258][ T4174] de20: 00000000 82e52dc0 00000064 dfb1de2c dfb1de2c 80209d24 834b9800 20000084 [ 201.195659][ T4174] de40: dfb1def4 dfb1de50 80253634 80209d30 00000000 20000000 20000000 81a0057c [ 201.196077][ T4174] de60: 819e3204 00000000 dfb1deb4 dfb1de78 8020d0cc 8020c034 dfb1de94 00000000 [ 201.196513][ T4174] de80: 8027fa10 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 201.196940][ T4174] dea0: 00000000 834ba400 dfb1dedc dfb1deb8 8027e354 802af5ec 00000000 00000000 [ 201.197219][ T4174] dec0: dfb1deec ca330578 834b9800 20000080 00004202 00000002 00000000 20000080 [ 201.197493][ T4174] dee0: 834ba400 0000001a dfb1df6c dfb1def8 8020a1e4 8025332c 834b9800 834ba084 [ 201.197754][ T4174] df00: dfb1df1c dfb1df10 819e36b0 8027c778 dfb1df6c dfb1df20 802813ec 819e368c [ 201.198032][ T4174] df20: dfb1df54 00000000 8027e354 60000013 81990410 819a7694 dfb1df54 ca330578 [ 201.198287][ T4174] df40: 00004205 834b9800 00004205 ca330578 834b9800 00004205 00000002 00000000 [ 201.198603][ T4174] df60: dfb1dfa4 dfb1df70 80252fdc 8020a140 80202cc0 ca330578 dfb1dfac 00000000 [ 201.198892][ T4174] df80: 00000000 002862f4 0000001a 8020029c 834ba400 0000001a 00000000 dfb1dfa8 [ 201.199147][ T4174] dfa0: 80200060 80252db0 00000000 00000000 00004205 000000ba 00000002 20000080 [ 201.199418][ T4174] dfc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76b360bc [ 201.199671][ T4174] dfe0: 76b35ec0 76b35eb0 00018af0 00133450 60000010 00004205 00000000 00000000 [ 201.200012][ T4174] Call trace: [ 201.200289][ T4174] [<819be4e8>] (usercopy_abort) from [<804d5d54>] (__check_heap_object+0xd8/0xf4) [ 201.201100][ T4174] [<804d5c7c>] (__check_heap_object) from [<80514b34>] (__check_object_size+0x288/0x304) [ 201.201445][ T4174] r8:dde6f9e0 r7:834b98c4 r6:00000000 r5:00000074 r4:834b9850 [ 201.201702][ T4174] [<805148ac>] (__check_object_size) from [<80209db4>] (fpa_set+0x90/0x118) [ 201.202024][ T4174] r10:81a00568 r9:00000078 r8:81a005a0 r7:00000074 r6:20000084 r5:00000074 [ 201.202617][ T4174] r4:834b9850 [ 201.202885][ T4174] [<80209d24>] (fpa_set) from [<80253634>] (ptrace_request+0x314/0xa78) [ 201.203136][ T4174] r6:20000084 r5:834b9800 r4:80209d24 [ 201.203302][ T4174] [<80253320>] (ptrace_request) from [<8020a1e4>] (arch_ptrace+0xb0/0x424) [ 201.203586][ T4174] r10:0000001a r9:834ba400 r8:20000080 r7:00000000 r6:00000002 r5:00004202 [ 201.203816][ T4174] r4:20000080 [ 201.203936][ T4174] [<8020a134>] (arch_ptrace) from [<80252fdc>] (sys_ptrace+0x238/0x4dc) [ 201.204213][ T4174] r7:00000000 r6:00000002 r5:00004205 r4:834b9800 [ 201.204377][ T4174] [<80252da4>] (sys_ptrace) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 201.204675][ T4174] Exception stack(0xdfb1dfa8 to 0xdfb1dff0) [ 201.204859][ T4174] dfa0: 00000000 00000000 00004205 000000ba 00000002 20000080 [ 201.205125][ T4174] dfc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76b360bc [ 201.205380][ T4174] dfe0: 76b35ec0 76b35eb0 00018af0 00133450 [ 201.205564][ T4174] r10:0000001a r9:834ba400 r8:8020029c r7:0000001a r6:002862f4 r5:00000000 [ 201.205807][ T4174] r4:00000000 [ 201.206340][ T4174] Code: e30f067c e3480205 e58dc000 ebfff265 (e7f001f2) [ 201.207116][ T4174] ---[ end trace 0000000000000000 ]--- [ 201.207873][ T4174] Kernel panic - not syncing: Fatal exception [ 201.210971][ T4174] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:42:22 Registers: info registers vcpu 0 CPU#0 R00=dfb1d7f2 R01=819be580 R02=00000000 R03=00000001 R04=dfb1db95 R05=dfb1db94 R06=8202b29f R07=819be580 R08=8202b29f R09=dfb1db04 R10=dfb1db94 R11=dfb1d7dc R12=dfb1d7e0 R13=dfb1d7d0 R14=8032ca6c R15=8032c910 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=820413b8 R02=0011ae09 R03=80219bc0 R04=82e3ec00 R05=8260c610 R06=00000001 R07=8260c63c R08=00000001 R09=00000000 R10=00000000 R11=df869f64 R12=df869f68 R13=df869f58 R14=802089ac R15=80219bc8 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=004d27e9 s17=00000000 d08=00000000004d27e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=6a516975 s33=e244d160 d16=e244d1606a516975 s34=93db6bbe s35=c52f860f d17=c52f860f93db6bbe s36=4fa1749e s37=126dea66 d18=126dea664fa1749e s38=95698d7c s39=0019b857 d19=0019b85795698d7c s40=da26bf6f s41=6219a848 d20=6219a848da26bf6f s42=c19828ba s43=c339c29d d21=c339c29dc19828ba s44=7338d0f3 s45=591bc7f3 d22=591bc7f37338d0f3 s46=882b4a25 s47=7e8fa18f d23=7e8fa18f882b4a25 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=003c0000 s53=00280000 d26=00280000003c0000 s54=00140000 s55=00080000 d27=0008000000140000 s56=00000008 s57=00080004 d28=0008000400000008 s58=03e60000 s59=ffae0000 d29=ffae000003e60000 s60=0008ffff s61=00000000 d30=000000000008ffff s62=00000300 s63=ffbe0000 d31=ffbe000000000300 FPSCR: 00000000