Warning: Permanently added '[localhost]:49547' (ED25519) to the list of known hosts. 1970/01/01 00:01:42 ignoring optional flag "sandboxArg"="0" 1970/01/01 00:01:43 parsed 1 programs [ 103.975553][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 103.975600][ T31] audit: type=1400 audit(103.940:131): avc: denied { mounton } for pid=3535 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 103.978380][ T31] audit: type=1400 audit(103.940:132): avc: denied { mount } for pid=3535 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 104.049995][ T31] audit: type=1400 audit(104.020:133): avc: denied { unlink } for pid=3535 comm="syz-executor" name="swap-file" dev="vda" ino=686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 108.036782][ T3535] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:01:48 executed programs: 0 [ 108.681583][ T3540] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 108.683805][ T3540] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 108.949479][ T3540] hsr_slave_0: entered promiscuous mode [ 108.950413][ T3540] hsr_slave_1: entered promiscuous mode [ 109.306999][ T3540] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 109.320366][ T3540] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 109.322875][ T3540] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 109.324998][ T3540] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 110.500070][ T3540] 8021q: adding VLAN 0 to HW filter on device bond0 [ 114.311278][ T3540] veth0_vlan: entered promiscuous mode [ 114.315428][ T3540] veth1_vlan: entered promiscuous mode [ 114.355035][ T3540] veth0_macvtap: entered promiscuous mode [ 114.369650][ T3540] veth1_macvtap: entered promiscuous mode [ 114.399904][ T3540] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.400295][ T3540] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.400564][ T3540] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.401116][ T3540] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:01:54 executed programs: 1 [ 114.781046][ T3944] usercopy: Kernel memory overwrite attempt detected to SLUB object 'task_struct' (offset 80, size 116)! [ 114.782259][ T3944] ------------[ cut here ]------------ [ 114.782473][ T3944] kernel BUG at mm/usercopy.c:102! [ 114.782728][ T3944] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM [ 114.783020][ T3944] Modules linked in: [ 114.783812][ T3944] CPU: 0 PID: 3944 Comm: syz-executor.0 Not tainted 6.9.0-syzkaller #0 [ 114.784262][ T3944] Hardware name: ARM-Versatile Express [ 114.784996][ T3944] PC is at usercopy_abort+0x98/0x9c [ 114.785683][ T3944] LR is at __wake_up_klogd.part.0+0x7c/0xac [ 114.785853][ T3944] pc : [<818d1418>] lr : [<802bb78c>] psr: 60000013 [ 114.785993][ T3944] sp : dfa39e40 ip : dfa39d88 fp : dfa39e64 [ 114.786129][ T3944] r10: 0000001a r9 : 83788000 r8 : 83dc8050 [ 114.786257][ T3944] r7 : dde84020 r6 : 00000000 r5 : 00000074 r4 : 00000050 [ 114.786400][ T3944] r3 : 83788000 r2 : 00000000 r1 : 00000000 r0 : 00000066 [ 114.786585][ T3944] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 114.786752][ T3944] Control: 30c5387d Table: 847d1fc0 DAC: fffffffd [ 114.786910][ T3944] Register r0 information: non-paged memory [ 114.787370][ T3944] Register r1 information: NULL pointer [ 114.787505][ T3944] Register r2 information: NULL pointer [ 114.787621][ T3944] Register r3 information: slab task_struct start 83788000 pointer offset 0 size 3072 [ 114.788308][ T3944] Register r4 information: non-paged memory [ 114.788783][ T3944] Register r5 information: non-paged memory [ 114.789097][ T3944] Register r6 information: NULL pointer [ 114.789224][ T3944] Register r7 information: non-slab/vmalloc memory [ 114.789560][ T3944] Register r8 information: slab task_struct start 83dc8000 pointer offset 80 size 3072 [ 114.789937][ T3944] Register r9 information: slab task_struct start 83788000 pointer offset 0 size 3072 [ 114.790577][ T3944] Register r10 information: non-paged memory [ 114.791111][ T3944] Register r11 information: 2-page vmalloc region starting at 0xdfa38000 allocated at kernel_clone+0xac/0x3c8 [ 114.791582][ T3944] Register r12 information: 2-page vmalloc region starting at 0xdfa38000 allocated at kernel_clone+0xac/0x3c8 [ 114.792301][ T3944] Process syz-executor.0 (pid: 3944, stack limit = 0xdfa38000) [ 114.792624][ T3944] Stack: (0xdfa39e40 to 0xdfa3a000) [ 114.792860][ T3944] 9e40: 820000c4 81fd28a4 81fe70d0 00000050 00000074 83788000 dfa39e94 dfa39e68 [ 114.793170][ T3944] 9e60: 804bce1c 818d138c 00000074 dfa39e78 80215d90 83dc8050 00000074 00000000 [ 114.793367][ T3944] 9e80: 83dc80c4 dde84020 dfa39ecc dfa39e98 804f3ee0 804bcd50 00000074 00000001 [ 114.793535][ T3944] 9ea0: dfa39ebc 83dc8050 00000074 00000001 00000000 00000000 83788000 0000001a [ 114.793870][ T3944] 9ec0: dfa39ef4 dfa39ed0 80209c80 804f3d00 dfa39ef4 dfa39ee0 818f5bd8 8027daec [ 114.794159][ T3944] 9ee0: 00000000 0000000c dfa39f6c dfa39ef8 8020a2bc 80209bfc 00000000 00000000 [ 114.794330][ T3944] 9f00: dfa39f1c dfa39f10 818f5aa4 8027c158 dfa39f6c dfa39f20 80281f9c 818f5a80 [ 114.794599][ T3944] 9f20: dfa39f54 00000000 8027dc0c 60000013 818a3774 818bab28 dfa39f54 c7548954 [ 114.794769][ T3944] 9f40: 83dc8000 0000000f 83dc8000 c7548954 0000000f 83dc8000 00000001 00000000 [ 114.795116][ T3944] 9f60: dfa39fa4 dfa39f70 80253810 80209fd4 80202bfc c7548954 dfa39fac 00000000 [ 114.795283][ T3944] 9f80: 00000000 0014c2cc 0000001a 80200288 83788000 0000001a 00000000 dfa39fa8 [ 114.795926][ T3944] 9fa0: 80200060 802535e4 00000000 00000000 0000000f 00000007 00000001 00000000 [ 114.796114][ T3944] 9fc0: 00000000 00000000 0014c2cc 0000001a 7e92b326 7e92b327 003d0f00 76b2f0fc [ 114.796282][ T3944] 9fe0: 76b2ef08 76b2eef8 000167e8 00050bd0 60000010 0000000f 00000000 00000000 [ 114.796707][ T3944] Call trace: [ 114.796946][ T3944] [<818d1380>] (usercopy_abort) from [<804bce1c>] (__check_heap_object+0xd8/0xf4) [ 114.797300][ T3944] [<804bcd44>] (__check_heap_object) from [<804f3ee0>] (__check_object_size+0x1ec/0x30c) [ 114.797802][ T3944] r8:dde84020 r7:83dc80c4 r6:00000000 r5:00000074 r4:83dc8050 [ 114.797956][ T3944] [<804f3cf4>] (__check_object_size) from [<80209c80>] (fpa_set+0x90/0xfc) [ 114.798164][ T3944] r10:0000001a r9:83788000 r8:00000000 r7:00000000 r6:00000001 r5:00000074 [ 114.798328][ T3944] r4:83dc8050 [ 114.798632][ T3944] [<80209bf0>] (fpa_set) from [<8020a2bc>] (arch_ptrace+0x2f4/0x3e4) [ 114.799169][ T3944] r5:0000000c r4:00000000 [ 114.799546][ T3944] [<80209fc8>] (arch_ptrace) from [<80253810>] (sys_ptrace+0x238/0x4e0) [ 114.799764][ T3944] r7:00000000 r6:00000001 r5:83dc8000 r4:0000000f [ 114.799894][ T3944] [<802535d8>] (sys_ptrace) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 114.800178][ T3944] Exception stack(0xdfa39fa8 to 0xdfa39ff0) [ 114.800312][ T3944] 9fa0: 00000000 00000000 0000000f 00000007 00000001 00000000 [ 114.800495][ T3944] 9fc0: 00000000 00000000 0014c2cc 0000001a 7e92b326 7e92b327 003d0f00 76b2f0fc [ 114.800658][ T3944] 9fe0: 76b2ef08 76b2eef8 000167e8 00050bd0 [ 114.800785][ T3944] r10:0000001a r9:83788000 r8:80200288 r7:0000001a r6:0014c2cc r5:00000000 [ 114.800941][ T3944] r4:00000000 [ 114.801328][ T3944] Code: e30000c8 e3480200 e58dc000 ebfff359 (e7f001f2) [ 114.801712][ T3944] ---[ end trace 0000000000000000 ]--- [ 114.802039][ T3944] Kernel panic - not syncing: Fatal exception [ 114.803680][ T3944] Rebooting in 86400 seconds..