[ 28.754875][ T30] audit: type=1400 audit(28.710:68): avc: denied { read write } for pid=2983 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.756240][ T30] audit: type=1400 audit(28.710:69): avc: denied { open } for pid=2983 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:42974' (ED25519) to the list of known hosts. [ 51.395504][ T30] audit: type=1400 audit(51.350:70): avc: denied { name_bind } for pid=2990 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 52.229264][ T30] audit: type=1400 audit(52.180:71): avc: denied { execute } for pid=2992 comm="sh" name="syz-fuzzer" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 52.237510][ T30] audit: type=1400 audit(52.190:72): avc: denied { execute_no_trans } for pid=2992 comm="sh" path="/syz-fuzzer" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:00:56 fuzzer started [ 58.104141][ T30] audit: type=1400 audit(58.060:73): avc: denied { node_bind } for pid=2992 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 1970/01/01 00:00:58 dialing manager at localhost:30000 [ 58.148231][ T30] audit: type=1400 audit(58.100:74): avc: denied { name_bind } for pid=2992 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 58.942874][ T30] audit: type=1400 audit(58.900:75): avc: denied { mounton } for pid=3001 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=682 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 58.944869][ T30] audit: type=1400 audit(58.900:76): avc: denied { mount } for pid=3001 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 58.953715][ T3001] cgroup: Unknown subsys name 'net' [ 58.961817][ T30] audit: type=1400 audit(58.920:77): avc: denied { unmount } for pid=3001 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 59.112804][ T3001] cgroup: Unknown subsys name 'hugetlb' [ 59.113932][ T3001] cgroup: Unknown subsys name 'rlimit' [ 59.362267][ T30] audit: type=1400 audit(59.320:78): avc: denied { mounton } for pid=3001 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 59.363739][ T30] audit: type=1400 audit(59.320:79): avc: denied { mount } for pid=3001 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 59.366446][ T30] audit: type=1400 audit(59.320:80): avc: denied { setattr } for pid=3001 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 59.457593][ T3002] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 59.461179][ T30] audit: type=1400 audit(59.410:81): avc: denied { relabelto } for pid=3002 comm="mkswap" name="swap-file" dev="vda" ino=685 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 59.462393][ T30] audit: type=1400 audit(59.420:82): avc: denied { write } for pid=3002 comm="mkswap" path="/swap-file" dev="vda" ino=685 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 64.397765][ T3001] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:01:04 syscalls: 3016 1970/01/01 00:01:04 code coverage: CONFIG_KCOV is not enabled 1970/01/01 00:01:04 comparison tracing: CONFIG_KCOV is not enabled 1970/01/01 00:01:04 extra coverage: CONFIG_KCOV is not enabled 1970/01/01 00:01:04 delay kcov mmap: CONFIG_KCOV is not enabled 1970/01/01 00:01:04 setuid sandbox: enabled 1970/01/01 00:01:04 namespace sandbox: enabled 1970/01/01 00:01:04 Android sandbox: enabled 1970/01/01 00:01:04 fault injection: enabled 1970/01/01 00:01:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 1970/01/01 00:01:04 net packet injection: enabled 1970/01/01 00:01:04 net device setup: enabled 1970/01/01 00:01:04 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 1970/01/01 00:01:04 devlink PCI setup: PCI device 0000:00:10.0 is not available 1970/01/01 00:01:04 NIC VF setup: PCI device 0000:00:11.0 is not available 1970/01/01 00:01:04 USB emulation: enabled 1970/01/01 00:01:04 hci packet injection: /dev/vhci does not exist 1970/01/01 00:01:04 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 1970/01/01 00:01:04 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 1970/01/01 00:01:04 swap file: enabled 1970/01/01 00:01:05 starting 2 executor processes [ 65.174899][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 65.174997][ T30] audit: type=1400 audit(65.130:85): avc: denied { execmem } for pid=3004 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 65.186182][ T30] audit: type=1400 audit(65.140:86): avc: denied { mounton } for pid=3005 comm="syz-executor.1" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 65.187408][ T30] audit: type=1400 audit(65.140:87): avc: denied { mount } for pid=3005 comm="syz-executor.1" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 65.199748][ T30] audit: type=1400 audit(65.140:88): avc: denied { read } for pid=3005 comm="syz-executor.1" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 65.200932][ T30] audit: type=1400 audit(65.150:89): avc: denied { open } for pid=3005 comm="syz-executor.1" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 65.201769][ T30] audit: type=1400 audit(65.150:90): avc: denied { mounton } for pid=3005 comm="syz-executor.1" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 65.204127][ T30] audit: type=1400 audit(65.160:91): avc: denied { module_request } for pid=3005 comm="syz-executor.1" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 65.236060][ T30] audit: type=1400 audit(65.190:92): avc: denied { sys_module } for pid=3005 comm="syz-executor.1" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 65.513430][ T30] audit: type=1400 audit(65.470:93): avc: denied { ioctl } for pid=3005 comm="syz-executor.1" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.212213][ T3005] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.215918][ T3005] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.573737][ T3007] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.576219][ T3007] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.926669][ T3005] hsr_slave_0: entered promiscuous mode [ 66.933598][ T3005] hsr_slave_1: entered promiscuous mode [ 66.987941][ T3007] hsr_slave_0: entered promiscuous mode [ 66.990687][ T3007] hsr_slave_1: entered promiscuous mode [ 66.993140][ T3007] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 66.993451][ T3007] Cannot create hsr debugfs directory [ 67.265662][ T30] audit: type=1400 audit(67.220:94): avc: denied { create } for pid=3007 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 67.270771][ T3007] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 67.276697][ T3007] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 67.280151][ T3007] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 67.284110][ T3007] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 67.336116][ T3005] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 67.343860][ T3005] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 67.352387][ T3005] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 67.361158][ T3005] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 67.619279][ T3007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.925675][ T3005] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.459976][ T3007] veth0_vlan: entered promiscuous mode [ 69.469854][ T3007] veth1_vlan: entered promiscuous mode [ 69.505465][ T3007] veth0_macvtap: entered promiscuous mode [ 69.514113][ T3007] veth1_macvtap: entered promiscuous mode [ 69.567390][ T3007] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.568248][ T3007] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.573335][ T3007] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.573974][ T3007] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 00:01:09 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000003b80)=ANY=[@ANYBLOB="1c1c4e2b00001200feed000000000000000000ff00000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002c9e00000000000000001c00"/128, @ANYRES32=0x0, @ANYBLOB="eafffb04020d000090a18f6d67479dda67e81403f141986eb889b876815ec8ffdd849ccf0f27a4b40d9c40387597876b03b19c5b687a9905d882f75022d41ba1ea113de714de3213a20e0cf0d8033c3668f9a09f1b15c095a48fba21984be3582d0decc7f6bc6f8bf1d94c9f8b87918f1db8e63858ae337fd5a935e7e8f0ab0314c3269e6743905d1a9aa2a2383b1e"], 0x98) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x14}, 0x0) [ 69.793864][ T3005] veth0_vlan: entered promiscuous mode [ 69.804308][ T3005] veth1_vlan: entered promiscuous mode [ 69.834130][ T3005] veth0_macvtap: entered promiscuous mode 00:01:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) [ 69.854310][ T3005] veth1_macvtap: entered promiscuous mode [ 69.930382][ T3005] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.930882][ T3005] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.931064][ T3005] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.931325][ T3005] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.016280][ T3687] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list 00:01:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 00:01:10 executing program 1: sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) 00:01:10 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="292eee0379870fb20000000000000000850033c85a73e1fe01"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff0100000000000000000000000000010000000000000000000000000020000000e7ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006ce11bc3008b071000900000000000000000000000000009444000000002000000000000005"], 0x310) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) [ 70.241670][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 70.241721][ T30] audit: type=1400 audit(70.200:106): avc: denied { prog_load } for pid=3694 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 70.243480][ T30] audit: type=1400 audit(70.200:107): avc: denied { bpf } for pid=3694 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 00:01:10 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) [ 70.310892][ T3697] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 70.320118][ T30] audit: type=1400 audit(70.270:108): avc: denied { create } for pid=3696 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 70.321001][ T30] audit: type=1400 audit(70.270:109): avc: denied { bind } for pid=3696 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 00:01:10 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x20212, 0x0) 00:01:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x30, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_POSITION_ID={0x8}]}], {0x14}}, 0xa4}}, 0x0) 00:01:10 executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r1}, 0x10) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 70.412894][ T30] audit: type=1400 audit(70.370:110): avc: denied { map_create } for pid=3700 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 70.416107][ T30] audit: type=1400 audit(70.370:111): avc: denied { map_read map_write } for pid=3700 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 70.421834][ T30] audit: type=1400 audit(70.380:112): avc: denied { perfmon } for pid=3700 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 70.428128][ T30] audit: type=1400 audit(70.380:113): avc: denied { create } for pid=3701 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 70.435128][ T30] audit: type=1400 audit(70.390:114): avc: denied { write } for pid=3701 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 70.462805][ T30] audit: type=1400 audit(70.420:115): avc: denied { prog_run } for pid=3700 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 00:01:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_adj\x00') writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)='2', 0x1}], 0x1) 00:01:10 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000140)='mmap_lock_acquire_returned\x00', r0}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) sysinfo(0x0) [ 70.590243][ T3705] syz-executor.1 (3705): /proc/3704/oom_adj is deprecated, please use /proc/3704/oom_score_adj instead. 00:01:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000240)={0x13, 0x10, 0x110, {0x0, r1}}, 0x18) 00:01:10 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$tcp_congestion(r0, &(0x7f0000000100)='veno\x00', 0x5) 00:01:10 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) bind$packet(r0, &(0x7f0000001840)={0x11, 0x9, 0x0, 0x1, 0x6, 0x6, @multicast}, 0x14) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) syz_clone3(&(0x7f00000008c0)={0x10088000, &(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0), {0x8}, &(0x7f0000000800)=""/120, 0x78, &(0x7f0000004000)=""/4096, &(0x7f0000000880)=[0x0, 0x0, 0x0], 0x3}, 0x58) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000980)={0x1, &(0x7f0000000940)=[{0x3, 0x3d, 0x0, 0x2}]}) syz_open_dev$vcsn(&(0x7f00000009c0), 0x9d, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000007e40)=[{{&(0x7f0000000340)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1=0xe0000010}}, 0x1c, 0x0}}], 0x6c00, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) dup2(r2, r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 00:01:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000200), 0x4) [ 71.297262][ T3713] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list 00:01:12 executing program 1: syz_clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0], 0x1}, 0x58) 00:01:12 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) [ 73.099205][ C0] ------------[ cut here ]------------ [ 73.099584][ C0] WARNING: CPU: 0 PID: 0 at kernel/softirq.c:361 __local_bh_enable_ip+0xa0/0xd0 [ 73.102136][ C0] Modules linked in: [ 73.103062][ C0] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 73.105387][ C0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.9.0-rc2-syzkaller #0 [ 73.105858][ C0] Hardware name: ARM-Versatile Express [ 73.107044][ C0] Call trace: [ 73.107611][ C0] [<81879f7c>] (dump_backtrace) from [<8187a078>] (show_stack+0x18/0x1c) [ 73.108940][ C0] r7:00000000 r6:82622e44 r5:00000000 r4:81fc4838 [ 73.109335][ C0] [<8187a060>] (show_stack) from [<81897814>] (dump_stack_lvl+0x54/0x7c) [ 73.110451][ C0] [<818977c0>] (dump_stack_lvl) from [<81897854>] (dump_stack+0x18/0x1c) [ 73.110896][ C0] r5:00000000 r4:82858d18 [ 73.111094][ C0] [<8189783c>] (dump_stack) from [<8187ab20>] (panic+0x120/0x358) [ 73.112013][ C0] [<8187aa00>] (panic) from [<8024390c>] (print_tainted+0x0/0xa0) [ 73.112602][ C0] r3:8260c584 r2:00000001 r1:81fad4bc r0:81fb5064 [ 73.113576][ C0] r7:8024c8d0 [ 73.113989][ C0] [<80243898>] (check_panic_on_warn) from [<80243b00>] (__warn+0x7c/0x180) [ 73.114372][ C0] [<80243a84>] (__warn) from [<80243d7c>] (warn_slowpath_fmt+0x178/0x1f4) [ 73.115211][ C0] r8:00000009 r7:81fb599c r6:82601aa4 r5:8261ae80 r4:00000000 [ 73.115925][ C0] [<80243c08>] (warn_slowpath_fmt) from [<8024c8d0>] (__local_bh_enable_ip+0xa0/0xd0) [ 73.116403][ C0] r10:8260c590 r9:00000000 r8:00000008 r7:00000000 r6:00000000 r5:00000201 [ 73.117517][ C0] r4:8261ae80 [ 73.117699][ C0] [<8024c830>] (__local_bh_enable_ip) from [<818a4808>] (_raw_spin_unlock_bh+0x34/0x38) [ 73.118196][ C0] r5:84dc9dcc r4:ffffffea [ 73.118962][ C0] [<818a47d4>] (_raw_spin_unlock_bh) from [<8140f6a8>] (__sock_map_delete+0x4c/0x84) [ 73.119286][ C0] [<8140f65c>] (__sock_map_delete) from [<8140f70c>] (sock_map_delete_elem+0x2c/0x38) [ 73.119642][ C0] r7:00000000 r6:803c2f3c r5:809335b8 r4:e06d1000 [ 73.119829][ C0] [<8140f6e0>] (sock_map_delete_elem) from [<803c2f58>] (bpf_map_delete_elem+0x1c/0x24) [ 73.120993][ C0] [<803c2f3c>] (bpf_map_delete_elem) from [<7f0292ac>] (bpf_prog_2c29ac5cdc6b1842+0xc8/0xd4) [ 73.122864][ C0] [<7f0291e4>] (bpf_prog_2c29ac5cdc6b1842) from [<8037d698>] (bpf_trace_run2+0x70/0x158) [ 73.123381][ C0] r9:84fd8d00 r8:00000010 r7:809335b8 r6:84fd8d00 r5:809335b8 r4:e06d1000 [ 73.123919][ C0] [<8037d628>] (bpf_trace_run2) from [<80467064>] (__bpf_trace_kfree+0x28/0x30) [ 73.125116][ C0] r8:00000010 r7:809335b8 r6:84fd8d00 r5:809335b8 r4:850a5008 [ 73.125368][ C0] [<8046703c>] (__bpf_trace_kfree) from [<80464db8>] (__traceiter_kfree+0x3c/0x50) [ 73.125609][ C0] [<80464d7c>] (__traceiter_kfree) from [<804b2730>] (kfree+0x1f0/0x334) [ 73.125933][ C0] r7:809335b8 r6:00000000 r5:8261ae80 r4:84fd8d00 [ 73.126099][ C0] [<804b2540>] (kfree) from [<809335b8>] (detach_buf_split+0x13c/0x170) [ 73.127063][ C0] r10:8260c590 r9:84fd8d00 r8:00000010 r7:00000020 r6:00000000 r5:00000002 [ 73.127802][ C0] r4:83b6f180 [ 73.127919][ C0] [<8093347c>] (detach_buf_split) from [<80933678>] (virtqueue_get_buf_ctx_split+0x8c/0x15c) [ 73.128836][ C0] r9:00000000 r8:a0000193 r7:83b6f180 r6:83b6f0c0 r5:83d0d3f8 r4:83b6f180 [ 73.129040][ C0] [<809335ec>] (virtqueue_get_buf_ctx_split) from [<809340c8>] (virtqueue_get_buf+0x28/0x2c) [ 73.129650][ C0] r5:00000000 r4:83b6f180 [ 73.129834][ C0] [<809340a0>] (virtqueue_get_buf) from [<80a8434c>] (virtblk_done+0x78/0x104) [ 73.130979][ C0] [<80a842d4>] (virtblk_done) from [<80933e5c>] (vring_interrupt+0x88/0xfc) [ 73.131439][ C0] r9:20000193 r8:8341722c r7:00000021 r6:83417230 r5:00000000 r4:83b6f180 [ 73.132103][ C0] [<80933dd4>] (vring_interrupt) from [<809390c0>] (vm_interrupt+0x70/0xa8) [ 73.133035][ C0] r5:00000000 r4:83b69d80 [ 73.133346][ C0] [<80939050>] (vm_interrupt) from [<802c1924>] (__handle_irq_event_percpu+0x5c/0x278) [ 73.135013][ C0] r9:00000021 r8:00000000 r7:82601dc0 r6:8261ae80 r5:83b62f6c r4:83b69c80 [ 73.138876][ C0] [<802c18c8>] (__handle_irq_event_percpu) from [<802c1bc8>] (handle_irq_event+0x40/0x88) [ 73.140403][ C0] r10:00000002 r9:8261ae80 r8:00000000 r7:82601dc0 r6:83b62f6c r5:83b62f6c [ 73.140767][ C0] r4:83b62f00 [ 73.141479][ C0] [<802c1b88>] (handle_irq_event) from [<802c6ac8>] (handle_fasteoi_irq+0xbc/0x268) [ 73.143279][ C0] r7:82601dc0 r6:81b0fa24 r5:83b62f6c r4:83b62f00 [ 73.143674][ C0] [<802c6a0c>] (handle_fasteoi_irq) from [<802c1008>] (generic_handle_domain_irq+0x30/0x40) [ 73.145273][ C0] r7:df80a00c r6:824b2500 r5:df80a000 r4:8260ce40 [ 73.146950][ C0] [<802c0fd8>] (generic_handle_domain_irq) from [<802011c4>] (gic_handle_irq+0x68/0x7c) [ 73.148771][ C0] [<8020115c>] (gic_handle_irq) from [<818980f4>] (generic_handle_arch_irq+0x60/0x80) [ 73.149493][ C0] r7:82601e38 r6:82146924 r5:82182b4c r4:824b3ca4 [ 73.149737][ C0] [<81898094>] (generic_handle_arch_irq) from [<80200b74>] (__irq_svc+0x74/0xac) [ 73.150177][ C0] Exception stack(0x82601e38 to 0x82601e80) [ 73.150588][ C0] 1e20: 00000001 81fc4838 [ 73.153423][ C0] 1e40: 00000001 8261ae80 00000000 dddd0440 8189bb08 842d9e00 845b5400 8261ae80 [ 73.155258][ C0] 1e60: 00000002 82601ecc 82601e78 82601e88 818a4868 8027cbcc 20000013 ffffffff [ 73.156876][ C0] r9:8261ae80 r8:845b5400 r7:82601e6c r6:ffffffff r5:20000013 r4:8027cbcc [ 73.158683][ C0] [<8027cb40>] (finish_task_switch) from [<8189bb08>] (__schedule+0x408/0xc10) [ 73.159801][ C0] r10:00000000 r9:842d9e00 r8:00000000 r7:842d9e00 r6:8261ae80 r5:dddd0440 [ 73.160820][ C0] r4:83611800 [ 73.161302][ C0] [<8189b700>] (__schedule) from [<8189c884>] (schedule_idle+0x24/0x68) [ 73.163223][ C0] r10:00000000 r9:00000000 r8:00000000 r7:8260c5b8 r6:8261ae80 r5:00000000 [ 73.164293][ C0] r4:8261ae80 [ 73.165412][ C0] [<8189c860>] (schedule_idle) from [<80299ef8>] (do_idle+0x19c/0x2cc) [ 73.169262][ C0] r5:00000000 r4:8260c590 [ 73.169731][ C0] [<80299d5c>] (do_idle) from [<8029a35c>] (cpu_startup_entry+0x30/0x34) [ 73.171397][ C0] r10:82858000 r9:8261a970 r8:820d7468 r7:00000000 r6:8260c540 r5:82625eec [ 73.172200][ C0] r4:000000eb [ 73.173538][ C0] [<8029a32c>] (cpu_startup_entry) from [<81899b68>] (kernel_init+0x0/0x134) [ 73.175269][ C0] [<81899a88>] (rest_init) from [<824012c0>] (start_kernel+0x6a8/0x6c4) [ 73.176866][ C0] [<82400c18>] (start_kernel) from [<00000000>] (0x0) [ 73.180139][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 03:30:31 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=00000000 R02=8261ae80 R03=00000000 R04=81fc4838 R05=00000000 R06=82622e44 R07=00000000 R08=81fb5064 R09=8024c8d0 R10=00000000 R11=82601a04 R12=826019f0 R13=826019f0 R14=818977d4 R15=818977d4 PSR=60000193 -ZC- A S svc32 s00=05ec76f0 s01=00000001 d00=0000000105ec76f0 s02=dea713f1 s03=00000000 d01=00000000dea713f1 s04=00720f1a s05=cc966064 d02=cc96606400720f1a s06=00000000 s07=00000000 d03=0000000000000000 s08=7c6b6560 s09=00739ca0 d04=00739ca07c6b6560 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=00000000 d06=00000000ffffffff s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=c8bfa106 s21=d1bd21f6 d10=d1bd21f6c8bfa106 s22=4b129b63 s23=00000000 d11=000000004b129b63 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=a5c09000 R01=dffd3000 R02=00000000 R03=8021b3b4 R04=7f00b000 R05=00000001 R06=828a8de8 R07=7f00b000 R08=dffd3000 R09=8260ca94 R10=828a9a0c R11=dfd65dac R12=dfd65db0 R13=dfd65d80 R14=80210b70 R15=8021b3cc PSR=80000013 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000