Warning: Permanently added '10.128.0.46' (ECDSA) to the list of known hosts. 2019/11/03 04:44:27 fuzzer started 2019/11/03 04:44:28 dialing manager at 10.128.0.26:45781 2019/11/03 04:44:28 syscalls: 1394 2019/11/03 04:44:28 code coverage: enabled 2019/11/03 04:44:28 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/11/03 04:44:28 extra coverage: extra coverage is not supported by the kernel 2019/11/03 04:44:28 setuid sandbox: enabled 2019/11/03 04:44:28 namespace sandbox: enabled 2019/11/03 04:44:28 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/03 04:44:28 fault injection: kernel does not have systematic fault injection support 2019/11/03 04:44:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/03 04:44:28 net packet injection: enabled 2019/11/03 04:44:28 net device setup: enabled 2019/11/03 04:44:28 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 04:45:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3}, 0x0) flistxattr(r2, &(0x7f0000001340)=""/160, 0xa0) fsync(0xffffffffffffffff) 04:45:04 executing program 5: getdents(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000380)=ANY=[@ANYBLOB="001a00000000000009ce47f151fb2e3e2d77fc5b350954e71bce24e3630334e58e79f36678899403303521a6ed97a81030802f6c2699f084b61d5af18c3410a9319cd697c6037141930e5d0f81fadb8e7c80889d59d7a691ac96b84688c2d250cf43c6b01b7245b35a4ade864db71bedda33cb0ac6cd437dd92683a0c2cb21a501ef0e0c63b5a488f88edb15b4837afafad37c2097c8a0842dcdf5d0bff1866b41b0295e1e7152c09933aab14a514188e19a3c874ffd4173fd9e03e5e67fdd5f498959326e7b4e2eb113f8944fc204000000490000"], 0xe0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f00000001c0)=0x7, 0xffffff96) sendto(0xffffffffffffffff, &(0x7f0000000340), 0xac, 0x0, 0x0, 0xfffffffffffffe73) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127c, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$void(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x1a) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8040fffffffd) 04:45:04 executing program 2: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x22fffffe) 04:45:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000001900)) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = dup2(r1, r2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x1b) close(r0) 04:45:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x584, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:45:04 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 65.936554] audit: type=1400 audit(1572756304.729:5): avc: denied { sys_admin } for pid=2079 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 66.070791] audit: type=1400 audit(1572756304.869:6): avc: denied { net_admin } for pid=2084 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 66.397298] audit: type=1400 audit(1572756305.199:7): avc: denied { sys_chroot } for pid=2084 comm="syz-executor.5" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 66.430851] audit: type=1400 audit(1572756305.229:8): avc: denied { associate } for pid=2084 comm="syz-executor.5" name="syz5" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 04:45:05 executing program 2: accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f00000003c0)) r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) sendmsg(0xffffffffffffffff, 0x0, 0x80) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfb120eb7) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) prctl$PR_MCE_KILL_GET(0x22) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240)) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) open(&(0x7f0000000080)='./file0\x00', 0x200000, 0x20) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r3, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) [ 66.512144] audit: type=1400 audit(1572756305.309:9): avc: denied { net_raw } for pid=2227 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 04:45:05 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) io_setup(0x3, &(0x7f00000001c0)) socket$inet6(0x10, 0x4, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000340)) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) ptrace(0x8, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200440c1, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = dup(r3) connect(r4, &(0x7f0000000180)=@ipx={0x4, 0x7, 0x80000001, "199a04efcbe0", 0x7}, 0x80) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp\x00') r6 = dup(r2) sendfile(r6, r5, 0x0, 0x525) fcntl$lock(r5, 0x6, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x2}) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x200001, 0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) sendto(r8, &(0x7f0000000000)="78942fdbee152e72d0074822d43aa83a72c2b1d82485e44dcaeb0f7444d4cd5b2381fdbc1467ac19cd8651459fefffbc74d2f01ad85361ebef68c6cc7e65a3bb177a4c1a0356a30c5c22cd7ceff164eba66f5790e3c1718fab", 0x59, 0x800, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, &(0x7f00000003c0)=0x7) r9 = gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TIOCGPTPEER(r7, 0x5441, 0x7f) ptrace(0x10, r9) wait4(0x0, 0x0, 0x2, 0x0) [ 66.580055] ------------[ cut here ]------------ [ 66.585680] WARNING: CPU: 1 PID: 2246 at net/core/skbuff.c:4375 skb_try_coalesce+0xeb1/0x1270 [ 66.598185] Kernel panic - not syncing: panic_on_warn set ... [ 66.598185] [ 66.605586] CPU: 1 PID: 2246 Comm: syz-executor.5 Not tainted 4.9.141+ #1 [ 66.612508] ffff8801d13c7060 ffffffff81b42e79 ffffffff82a38ce0 00000000ffffffff [ 66.620580] ffffffff82c6f700 0000000000000001 0000000000000009 ffff8801d13c7120 [ 66.628642] ffffffff813f7125 0000000041b58ab3 ffffffff82e2b62b ffffffff813f6f66 [ 66.636709] Call Trace: [ 66.639292] [] dump_stack+0xc1/0x128 [ 66.644655] [] panic+0x1bf/0x39f [ 66.649678] [] ? add_taint.cold.5+0x16/0x16 [ 66.655692] [] ? __warn.cold.8+0x14/0x2f [ 66.661398] [] ? skb_try_coalesce+0xeb1/0x1270 [ 66.667625] [] __warn.cold.8+0x2f/0x2f [ 66.673372] [] warn_slowpath_null+0x2c/0x40 [ 66.679346] [] skb_try_coalesce+0xeb1/0x1270 [ 66.685402] [] tcp_try_coalesce+0x159/0x490 [ 66.691368] [] ? tcp_prune_ofo_queue.part.19+0x460/0x460 [ 66.698468] [] ? tcp_try_rmem_schedule+0x13a/0x1010 [ 66.705129] [] tcp_queue_rcv+0x127/0x590 [ 66.710834] [] tcp_data_queue+0x96d/0x38a0 [ 66.716715] [] ? trace_hardirqs_on+0x10/0x10 [ 66.722765] [] ? tcp_fin+0x7c0/0x7c0 [ 66.728121] [] ? tcp_xmit_recovery.part.25+0x120/0x120 [ 66.735042] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 66.741791] [] tcp_rcv_established+0x53d/0x1ff0 [ 66.747176] audit: type=1400 audit(1572756305.539:10): avc: denied { dac_override } for pid=2265 comm="syz-executor.4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 66.772642] [] ? check_preemption_disabled+0x3b/0x200 [ 66.779488] [] ? tcp_data_queue+0x38a0/0x38a0 [ 66.785640] [] ? rt6_check+0x110/0x250 [ 66.791170] [] ? rt6_check_expired+0x120/0x120 [ 66.797402] [] tcp_v6_do_rcv+0xcd1/0x10e0 [ 66.803207] [] __release_sock+0x13a/0x390 [ 66.808999] [] release_sock+0x59/0x1c0 [ 66.812908] audit: type=1400 audit(1572756305.609:11): avc: denied { create } for pid=2265 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 66.816976] audit: type=1400 audit(1572756305.609:12): avc: denied { write } for pid=2265 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 66.862124] [] tcp_sendpage+0x6bf/0x1910 [ 66.867832] [] ? sk_stream_alloc_skb+0x5d0/0x5d0 [ 66.874238] [] ? check_preemption_disabled+0x3b/0x200 [ 66.881076] [] ? inet_sendpage+0x14b/0x510 [ 66.886953] [] ? sk_stream_alloc_skb+0x5d0/0x5d0 [ 66.893353] [] inet_sendpage+0x221/0x510 [ 66.899078] [] ? inet_sendpage+0x7b/0x510 [ 66.904872] [] kernel_sendpage+0x93/0xf0 [ 66.910573] [] ? inet_getname+0x3b0/0x3b0 [ 66.916371] [] sock_sendpage+0x8c/0xc0 [ 66.921904] [] ? kernel_sendpage+0xf0/0xf0 [ 66.927784] [] pipe_to_sendpage+0x266/0x330 [ 66.933753] [] ? generic_pipe_buf_nosteal+0x10/0x10 [ 66.940409] [] ? splice_from_pipe_next.part.2+0x226/0x2e0 [ 66.947591] [] __splice_from_pipe+0x316/0x710 [ 66.953729] [] ? generic_pipe_buf_nosteal+0x10/0x10 [ 66.960390] [] splice_from_pipe+0xf9/0x170 [ 66.966265] [] ? generic_pipe_buf_nosteal+0x10/0x10 [ 66.972924] [] ? splice_shrink_spd+0xb0/0xb0 [ 66.978972] [] generic_splice_sendpage+0x3c/0x50 [ 66.985374] [] ? splice_from_pipe+0x170/0x170 [ 66.991509] [] direct_splice_actor+0x128/0x190 [ 66.997735] [] splice_direct_to_actor+0x2c1/0x7e0 [ 67.004221] [] ? pipe_to_sendpage+0x330/0x330 [ 67.010361] [] ? do_splice_to+0x170/0x170 [ 67.016149] [] ? security_file_permission+0x8f/0x1e0 [ 67.022893] [] ? rw_verify_area+0xe5/0x2a0 [ 67.028772] [] do_splice_direct+0x1a3/0x270 [ 67.034733] [] ? splice_direct_to_actor+0x7e0/0x7e0 [ 67.041394] [] ? rw_verify_area+0xe5/0x2a0 [ 67.047268] [] do_sendfile+0x4f0/0xc30 [ 67.052798] [] ? do_compat_pwritev64+0x180/0x180 [ 67.059197] [] ? __might_fault+0x114/0x1d0 [ 67.062135] audit: type=1400 audit(1572756305.859:13): avc: denied { read } for pid=2265 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 67.088740] [] SyS_sendfile64+0x144/0x160 [ 67.094535] [] ? SyS_sendfile+0x160/0x160 [ 67.100326] [] ? do_syscall_64+0x48/0x550 [ 67.106119] [] ? SyS_sendfile+0x160/0x160 [ 67.111908] [] do_syscall_64+0x19f/0x550 [ 67.117610] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 67.125451] Kernel Offset: disabled [ 67.129112] Rebooting in 86400 seconds..