Warning: Permanently added '[localhost]:19509' (ED25519) to the list of known hosts. 1970/01/01 00:03:52 ignoring optional flag "sandboxArg"="0" 1970/01/01 00:03:55 parsed 1 programs [ 237.045266][ T31] audit: type=1400 audit(236.980:100): avc: denied { unlink } for pid=4056 comm="syz-executor" name="swap-file" dev="vda" ino=686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 245.639179][ T4056] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 248.043202][ T4104] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 248.049132][ T4104] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 248.563343][ T4104] hsr_slave_0: entered promiscuous mode [ 248.565429][ T4104] hsr_slave_1: entered promiscuous mode [ 249.201383][ T4104] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 249.211616][ T4104] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 249.221376][ T4104] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 249.229515][ T4104] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 250.770198][ T4104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.241127][ T4104] veth0_vlan: entered promiscuous mode [ 260.263589][ T4104] veth1_vlan: entered promiscuous mode [ 260.397982][ T4104] veth0_macvtap: entered promiscuous mode [ 260.419491][ T4104] veth1_macvtap: entered promiscuous mode [ 260.602181][ T4104] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.603460][ T4104] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.603822][ T4104] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.605245][ T4104] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.461415][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 261.578056][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 261.714202][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 261.854753][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 262.754203][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 262.808573][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 262.827483][ T11] bond0 (unregistering): Released all slaves [ 262.948679][ T11] hsr_slave_0: left promiscuous mode [ 262.952622][ T11] hsr_slave_1: left promiscuous mode [ 262.956270][ T11] veth1_macvtap: left promiscuous mode [ 262.956793][ T11] veth0_macvtap: left promiscuous mode [ 262.957120][ T11] veth1_vlan: left promiscuous mode [ 262.957554][ T11] veth0_vlan: left promiscuous mode 1970/01/01 00:04:30 executed programs: 0 [ 277.162884][ T4643] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 277.181903][ T4643] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 280.376991][ T4643] hsr_slave_0: entered promiscuous mode [ 280.379500][ T4643] hsr_slave_1: entered promiscuous mode [ 281.318955][ T4643] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 281.352789][ T4643] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 281.359462][ T4643] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 281.376917][ T4643] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 284.311938][ T4643] 8021q: adding VLAN 0 to HW filter on device bond0 [ 287.847615][ T4643] veth0_vlan: entered promiscuous mode [ 287.863613][ T4643] veth1_vlan: entered promiscuous mode [ 287.896025][ T4643] veth0_macvtap: entered promiscuous mode [ 287.902087][ T4643] veth1_macvtap: entered promiscuous mode [ 287.939207][ T4643] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 287.939589][ T4643] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 287.939800][ T4643] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 287.940052][ T4643] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.108798][ T31] audit: type=1400 audit(288.040:101): avc: denied { mount } for pid=5023 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 288.120597][ T31] audit: type=1400 audit(288.050:102): avc: denied { create } for pid=5023 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 288.193689][ T5024] ------------[ cut here ]------------ [ 288.194235][ T5024] WARNING: CPU: 0 PID: 5024 at lib/string_helpers.c:1029 __fortify_report+0x6c/0x74 [ 288.196974][ T5024] strnlen: detected buffer overflow: 17 byte read of buffer size 16 [ 288.197497][ T5024] Modules linked in: [ 288.199703][ T5024] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 288.204263][ T5024] CPU: 0 PID: 5024 Comm: syz-executor Not tainted 6.10.0-rc7-syzkaller #0 [ 288.213037][ T5024] Hardware name: ARM-Versatile Express [ 288.213867][ T5024] Call trace: [ 288.219488][ T5024] [<818d4fd8>] (dump_backtrace) from [<818d50d4>] (show_stack+0x18/0x1c) [ 288.220343][ T5024] r7:00000000 r6:82622d44 r5:00000000 r4:81fe1570 [ 288.220965][ T5024] [<818d50bc>] (show_stack) from [<818f273c>] (dump_stack_lvl+0x54/0x7c) [ 288.221357][ T5024] [<818f26e8>] (dump_stack_lvl) from [<818f277c>] (dump_stack+0x18/0x1c) [ 288.221758][ T5024] r5:00000000 r4:8285fd18 [ 288.222073][ T5024] [<818f2764>] (dump_stack) from [<818d5b7c>] (panic+0x120/0x358) [ 288.222453][ T5024] [<818d5a5c>] (panic) from [<80243dcc>] (print_tainted+0x0/0xa0) [ 288.222827][ T5024] r3:8260c5c4 r2:00000001 r1:81fca1dc r0:81fd1e34 [ 288.223148][ T5024] r7:8080f120 [ 288.223480][ T5024] [<80243d58>] (check_panic_on_warn) from [<80243fc0>] (__warn+0x7c/0x180) [ 288.224017][ T5024] [<80243f44>] (__warn) from [<802442ac>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 288.224354][ T5024] r8:00000009 r7:8202ef68 r6:dfa0ddb4 r5:84536c00 r4:00000000 [ 288.224830][ T5024] [<802440c8>] (warn_slowpath_fmt) from [<8080f120>] (__fortify_report+0x6c/0x74) [ 288.225287][ T5024] r10:8271c088 r9:00000005 r8:dfa0dec3 r7:83c93c00 r6:00000000 r5:836f7478 [ 288.225657][ T5024] r4:83c60000 [ 288.225944][ T5024] [<8080f0b4>] (__fortify_report) from [<818df3c8>] (__fortify_panic+0x10/0x14) [ 288.226439][ T5024] [<818df3b8>] (__fortify_panic) from [<8062a7a8>] (ext4_fileattr_get+0x0/0x78) [ 288.226861][ T5024] [<80628694>] (__ext4_ioctl) from [<8062aea4>] (ext4_ioctl+0x10/0x14) [ 288.227391][ T5024] r10:84536c00 r9:00000005 r8:845edc00 r7:00000000 r6:845edc01 r5:00000000 [ 288.227754][ T5024] r4:81009431 [ 288.227977][ T5024] [<8062ae94>] (ext4_ioctl) from [<8051a5a8>] (sys_ioctl+0x134/0xda4) [ 288.236769][ T5024] [<8051a474>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 288.237369][ T5024] Exception stack(0xdfa0dfa8 to 0xdfa0dff0) [ 288.238096][ T5024] dfa0: 00000000 00000000 00000005 81009431 00000000 00000000 [ 288.238797][ T5024] dfc0: 00000000 00000000 0014c2c8 00000036 7ed1132e 7ed1132f 003d0f00 76b130fc [ 288.239176][ T5024] dfe0: 76b12f08 76b12ef8 00016d28 00051560 [ 288.239753][ T5024] r10:00000036 r9:84536c00 r8:8020029c r7:00000036 r6:0014c2c8 r5:00000000 [ 288.240408][ T5024] r4:00000000 [ 288.244048][ T5024] Rebooting in 86400 seconds..