last executing test programs: 7m43.509320913s ago: executing program 0 (id=28): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) 7m40.195293725s ago: executing program 0 (id=29): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xe, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xeb}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) setgroups(0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r6 = socket(0x8000000010, 0x2, 0x0) write(r6, &(0x7f0000000c00)="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", 0xfc) socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$inet(0x2, 0x3, 0x4) sendto$inet(r7, &(0x7f0000000040)='\f', 0x1, 0x0, &(0x7f0000000340)={0x2, 0x4e24}, 0x10) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @empty}, {}, 0x0, {0x2, 0x0, @multicast1=0xe000cc02}}) mount(0x0, 0x0, 0x0, 0x1000, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) io_setup(0x7, &(0x7f0000000280)) socket$inet_udp(0x2, 0x2, 0x0) 7m25.21490635s ago: executing program 0 (id=32): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x1c1002, 0x0) write(r2, &(0x7f0000004200)='t', 0x1) 7m24.123173663s ago: executing program 0 (id=34): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 7m22.910637611s ago: executing program 0 (id=36): r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x1, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f00000000c0)=""/148, 0x94}], 0x1, 0x1, 0x0) ioctl$MON_IOCX_GETX(r0, 0x80089203, 0x0) 7m20.40083035s ago: executing program 0 (id=39): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone3(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x0, 'veth0_vlan\x00', {0x300}, 0x100}) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) sched_setaffinity(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fdffffff850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace$pokeuser(0x6, r6, 0x358, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 7m20.39630123s ago: executing program 32 (id=39): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone3(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x0, 'veth0_vlan\x00', {0x300}, 0x100}) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) sched_setaffinity(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fdffffff850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace$pokeuser(0x6, r6, 0x358, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 9.188038915s ago: executing program 2 (id=264): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000500000085000000d000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) socketpair(0x2, 0x2, 0x1, &(0x7f0000002c40)) 8.424499575s ago: executing program 2 (id=266): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000001000000000000000000000071120a000000000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @cgroup_sock_addr=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 7.868103387s ago: executing program 2 (id=267): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 6.914239686s ago: executing program 2 (id=268): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) close(r1) 4.064246569s ago: executing program 2 (id=270): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 3.967931833s ago: executing program 1 (id=271): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 3.131464495s ago: executing program 1 (id=272): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) close(r1) 1.964369052s ago: executing program 1 (id=273): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\n\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r3, r0}, 0xc) 1.676761114s ago: executing program 2 (id=274): socketpair(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 887.007614ms ago: executing program 1 (id=275): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0xc, 0x9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 235.118231ms ago: executing program 1 (id=276): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x18) gettid() 0s ago: executing program 1 (id=277): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r0, 0x4) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:19728' (ED25519) to the list of known hosts. [ 242.485216][ T30] audit: type=1400 audit(241.970:46): avc: denied { name_bind } for pid=3316 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 243.202732][ T30] audit: type=1400 audit(242.690:47): avc: denied { execute } for pid=3317 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 243.212892][ T30] audit: type=1400 audit(242.700:48): avc: denied { execute_no_trans } for pid=3317 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 249.622547][ T30] audit: type=1400 audit(249.110:49): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 249.638495][ T30] audit: type=1400 audit(249.120:50): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 249.693732][ T3317] cgroup: Unknown subsys name 'net' [ 249.737476][ T30] audit: type=1400 audit(249.220:51): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 250.009116][ T3317] cgroup: Unknown subsys name 'cpuset' [ 250.053910][ T3317] cgroup: Unknown subsys name 'rlimit' [ 250.385158][ T30] audit: type=1400 audit(249.870:52): avc: denied { setattr } for pid=3317 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 250.391287][ T30] audit: type=1400 audit(249.880:53): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 250.398298][ T30] audit: type=1400 audit(249.880:54): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 251.191226][ T3319] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 251.202947][ T30] audit: type=1400 audit(250.690:55): avc: denied { relabelto } for pid=3319 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 251.213789][ T30] audit: type=1400 audit(250.700:56): avc: denied { write } for pid=3319 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 251.359083][ T30] audit: type=1400 audit(250.850:57): avc: denied { read } for pid=3317 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 251.365049][ T30] audit: type=1400 audit(250.850:58): avc: denied { open } for pid=3317 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 251.395065][ T3317] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 287.339817][ T30] audit: type=1400 audit(286.810:59): avc: denied { execmem } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 287.485230][ T30] audit: type=1400 audit(286.970:60): avc: denied { read } for pid=3322 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 287.487576][ T30] audit: type=1400 audit(286.970:61): avc: denied { open } for pid=3322 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 287.502511][ T30] audit: type=1400 audit(286.990:62): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 287.568262][ T30] audit: type=1400 audit(287.040:63): avc: denied { module_request } for pid=3322 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 287.880756][ T30] audit: type=1400 audit(287.370:64): avc: denied { sys_module } for pid=3323 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 296.783797][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 296.834321][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 297.593524][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 297.645009][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 301.023644][ T3323] hsr_slave_0: entered promiscuous mode [ 301.044915][ T3323] hsr_slave_1: entered promiscuous mode [ 302.689493][ T3322] hsr_slave_0: entered promiscuous mode [ 302.699647][ T3322] hsr_slave_1: entered promiscuous mode [ 302.709552][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 302.713036][ T3322] Cannot create hsr debugfs directory [ 303.948625][ T30] audit: type=1400 audit(303.430:65): avc: denied { create } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.949639][ T30] audit: type=1400 audit(303.430:66): avc: denied { write } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.960282][ T30] audit: type=1400 audit(303.450:67): avc: denied { read } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 304.043672][ T3323] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 304.174912][ T3323] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 304.283515][ T3323] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 304.410558][ T3323] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 305.834184][ T3322] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 305.895115][ T3322] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 305.963460][ T3322] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 306.033884][ T3322] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 308.685692][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.630746][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.814103][ T3323] veth0_vlan: entered promiscuous mode [ 322.921150][ T3323] veth1_vlan: entered promiscuous mode [ 323.375002][ T3323] veth0_macvtap: entered promiscuous mode [ 323.459692][ T3323] veth1_macvtap: entered promiscuous mode [ 323.994849][ T55] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.010461][ T55] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.013258][ T55] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.071501][ T55] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.848660][ T30] audit: type=1400 audit(324.330:68): avc: denied { mount } for pid=3323 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 324.903036][ T30] audit: type=1400 audit(324.390:69): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/syzkaller.WfIpJO/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 324.941354][ T30] audit: type=1400 audit(324.430:70): avc: denied { mount } for pid=3323 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 324.993414][ T30] audit: type=1400 audit(324.480:71): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/syzkaller.WfIpJO/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 324.995474][ T3322] veth0_vlan: entered promiscuous mode [ 325.037240][ T30] audit: type=1400 audit(324.520:72): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/syzkaller.WfIpJO/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 325.175708][ T30] audit: type=1400 audit(324.660:73): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 325.218343][ T30] audit: type=1400 audit(324.690:74): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 325.234771][ T30] audit: type=1400 audit(324.720:75): avc: denied { mount } for pid=3323 comm="syz-executor" name="/" dev="gadgetfs" ino=4268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 325.271524][ T3322] veth1_vlan: entered promiscuous mode [ 325.314363][ T30] audit: type=1400 audit(324.800:76): avc: denied { mount } for pid=3323 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 325.365178][ T30] audit: type=1400 audit(324.830:77): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 325.809788][ T3323] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 325.924741][ T3322] veth0_macvtap: entered promiscuous mode [ 325.983222][ T3322] veth1_macvtap: entered promiscuous mode [ 326.970913][ T55] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.972071][ T55] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.974220][ T55] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.975774][ T55] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.091595][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 331.092489][ T30] audit: type=1400 audit(330.580:87): avc: denied { map_create } for pid=3476 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 331.175789][ T30] audit: type=1400 audit(330.660:88): avc: denied { map_read map_write } for pid=3476 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 331.250476][ T30] audit: type=1400 audit(330.720:89): avc: denied { create } for pid=3476 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 331.251803][ T30] audit: type=1400 audit(330.730:90): avc: denied { setopt } for pid=3476 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 331.420204][ T30] audit: type=1400 audit(330.910:91): avc: denied { ioctl } for pid=3476 comm="syz.0.5" path="socket:[3772]" dev="sockfs" ino=3772 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 331.428105][ T30] audit: type=1400 audit(330.910:92): avc: denied { write } for pid=3476 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 331.494096][ T3477] IPv4: Oversized IP packet from 127.202.26.0 [ 332.784264][ T30] audit: type=1400 audit(332.010:93): avc: denied { create } for pid=3471 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 332.788407][ T30] audit: type=1400 audit(332.050:94): avc: denied { write } for pid=3471 comm="syz.1.2" path="socket:[3786]" dev="sockfs" ino=3786 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 339.728344][ T3488] syz.0.8 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 341.285295][ T30] audit: type=1400 audit(340.760:95): avc: denied { read write } for pid=3494 comm="syz.0.11" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 341.299109][ T30] audit: type=1400 audit(340.760:96): avc: denied { open } for pid=3494 comm="syz.0.11" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 341.300116][ T30] audit: type=1400 audit(340.780:97): avc: denied { ioctl } for pid=3494 comm="syz.0.11" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 341.835203][ T3497] capability: warning: `syz.1.12' uses deprecated v2 capabilities in a way that may be insecure [ 341.891633][ T75] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 342.209873][ T75] usb 1-1: Using ep0 maxpacket: 16 [ 342.281277][ T75] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 342.282010][ T75] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 342.404153][ T75] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 342.404803][ T75] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 342.405467][ T75] usb 1-1: Product: syz [ 342.405575][ T75] usb 1-1: Manufacturer: syz [ 342.405686][ T75] usb 1-1: SerialNumber: syz [ 343.007370][ T30] audit: type=1400 audit(342.490:98): avc: denied { create } for pid=3494 comm="syz.0.11" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 343.084996][ T30] audit: type=1400 audit(342.570:99): avc: denied { ioctl } for pid=3494 comm="syz.0.11" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3854 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 344.528670][ T30] audit: type=1400 audit(344.000:100): avc: denied { create } for pid=3494 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 344.588331][ T30] audit: type=1400 audit(344.060:101): avc: denied { ioctl } for pid=3494 comm="syz.0.11" path="socket:[3864]" dev="sockfs" ino=3864 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 347.949533][ T75] usb 1-1: 0:2 : does not exist [ 347.953242][ T75] usb 1-1: unit 6 not found! [ 357.185030][ T23] usb 1-1: USB disconnect, device number 2 [ 359.732156][ T3489] udevd[3489]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 384.023595][ T30] audit: type=1400 audit(383.490:102): avc: denied { read write } for pid=3522 comm="syz.1.18" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 384.072315][ T30] audit: type=1400 audit(383.530:103): avc: denied { open } for pid=3522 comm="syz.1.18" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 384.195125][ T30] audit: type=1400 audit(383.680:104): avc: denied { ioctl } for pid=3522 comm="syz.1.18" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 384.677896][ T30] audit: type=1400 audit(384.160:105): avc: denied { read write } for pid=3525 comm="syz.0.19" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 384.678962][ T30] audit: type=1400 audit(384.160:106): avc: denied { open } for pid=3525 comm="syz.0.19" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 384.679723][ T30] audit: type=1400 audit(384.160:107): avc: denied { ioctl } for pid=3525 comm="syz.0.19" path="/dev/uinput" dev="devtmpfs" ino=707 ioctlcmd=0x5564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 384.712930][ T3526] input: syz1 as /devices/virtual/input/input1 [ 384.719649][ T3526] input: failed to attach handler leds to device input1, error: -6 [ 389.425394][ T30] audit: type=1400 audit(388.810:108): avc: denied { create } for pid=3529 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 389.630822][ T30] audit: type=1400 audit(388.840:109): avc: denied { write } for pid=3529 comm="syz.0.21" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 397.697995][ T30] audit: type=1326 audit(397.180:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3534 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 397.733392][ T30] audit: type=1326 audit(397.220:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3534 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=292 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 397.751359][ T30] audit: type=1326 audit(397.240:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3534 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 397.755538][ T30] audit: type=1326 audit(397.240:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3534 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 399.208992][ T11] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 401.348472][ T11] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 401.349228][ T11] usb 1-1: config 0 has no interfaces? [ 401.363121][ T11] usb 1-1: New USB device found, idVendor=28de, idProduct=1142, bcdDevice= 0.00 [ 401.369031][ T11] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 401.476118][ T11] usb 1-1: config 0 descriptor?? [ 401.755505][ T3543] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 401.779900][ T3543] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 401.813730][ T30] audit: type=1400 audit(401.300:114): avc: denied { mount } for pid=3541 comm="syz.0.26" name="/" dev="configfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 402.090790][ T11] usb 1-1: USB disconnect, device number 3 [ 412.618825][ T3558] netlink: 'syz.0.29': attribute type 12 has an invalid length. [ 415.066920][ T30] audit: type=1400 audit(414.540:115): avc: denied { read write } for pid=3559 comm="syz.1.30" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 415.069566][ T30] audit: type=1400 audit(414.540:116): avc: denied { open } for pid=3559 comm="syz.1.30" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 415.204213][ T30] audit: type=1400 audit(414.690:117): avc: denied { ioctl } for pid=3559 comm="syz.1.30" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 419.301743][ T3562] wireguard0: entered promiscuous mode [ 419.332681][ T3562] wireguard0: entered allmulticast mode [ 421.420767][ T30] audit: type=1400 audit(420.890:118): avc: denied { mounton } for pid=3564 comm="syz.0.32" path="/17/bus" dev="tmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 421.695145][ T30] audit: type=1400 audit(421.180:119): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 422.540256][ T30] audit: type=1400 audit(422.030:120): avc: denied { create } for pid=3570 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 422.614089][ T30] audit: type=1400 audit(422.100:121): avc: denied { connect } for pid=3570 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 422.832531][ T3572] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 422.852764][ T3572] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 422.923757][ T30] audit: type=1400 audit(422.410:122): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 423.835646][ T3574] binfmt_misc: register: failed to install interpreter file ./file2 [ 425.510705][ T3579] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3579 comm=syz.1.38 [ 425.688225][ T3577] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 425.693659][ T3577] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 427.907843][ T30] audit: type=1400 audit(427.390:123): avc: denied { mounton } for pid=3590 comm="syz.1.42" path="/proc/51/task" dev="proc" ino=4031 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 427.925528][ T30] audit: type=1400 audit(427.410:124): avc: denied { mount } for pid=3590 comm="syz.1.42" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 435.389530][ T30] audit: type=1400 audit(434.880:125): avc: denied { create } for pid=3608 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 435.422071][ T30] audit: type=1400 audit(434.910:126): avc: denied { write } for pid=3608 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 435.431288][ T3609] netlink: 12 bytes leftover after parsing attributes in process `syz.1.45'. [ 435.699917][ T3609] A link change request failed with some changes committed already. Interface wg0 may have been left with an inconsistent configuration, please check. [ 435.763838][ T30] audit: type=1400 audit(435.250:127): avc: denied { create } for pid=3608 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 435.801701][ T30] audit: type=1400 audit(435.290:128): avc: denied { setopt } for pid=3608 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 436.599344][ T3609] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 436.660533][ T30] audit: type=1400 audit(436.150:129): avc: denied { bind } for pid=3608 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 444.362949][ T3583] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 444.465000][ T3583] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 449.671529][ T3634] netlink: 28 bytes leftover after parsing attributes in process `syz.1.47'. [ 449.813309][ T30] audit: type=1400 audit(449.300:130): avc: denied { create } for pid=3633 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 449.849091][ T30] audit: type=1400 audit(449.330:131): avc: denied { connect } for pid=3633 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 450.497458][ T3583] hsr_slave_0: entered promiscuous mode [ 450.508999][ T3583] hsr_slave_1: entered promiscuous mode [ 450.519076][ T3583] debugfs: 'hsr0' already exists in 'hsr' [ 450.521425][ T3583] Cannot create hsr debugfs directory [ 454.532269][ T3583] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 454.828418][ T3583] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 454.952503][ T3583] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 455.075542][ T3583] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 464.812806][ T3583] 8021q: adding VLAN 0 to HW filter on device bond0 [ 465.547416][ T30] audit: type=1400 audit(465.020:132): avc: denied { read write } for pid=3660 comm="syz.1.51" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 465.564392][ T30] audit: type=1400 audit(465.050:133): avc: denied { open } for pid=3660 comm="syz.1.51" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 465.612992][ T30] audit: type=1400 audit(465.100:134): avc: denied { block_suspend } for pid=3660 comm="syz.1.51" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 466.624685][ T30] audit: type=1400 audit(466.110:135): avc: denied { read write } for pid=3666 comm="syz.1.52" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 466.643466][ T30] audit: type=1400 audit(466.130:136): avc: denied { open } for pid=3666 comm="syz.1.52" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 466.683465][ T30] audit: type=1400 audit(466.160:137): avc: denied { ioctl } for pid=3666 comm="syz.1.52" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 470.750654][ T30] audit: type=1400 audit(469.960:138): avc: denied { write } for pid=3666 comm="syz.1.52" name="if_inet6" dev="proc" ino=4026532743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 491.515480][ T3699] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 491.517023][ T3699] IPv6: NLM_F_CREATE should be set when creating new route [ 495.283201][ T3583] veth0_vlan: entered promiscuous mode [ 495.442896][ T3583] veth1_vlan: entered promiscuous mode [ 495.944479][ T3583] veth0_macvtap: entered promiscuous mode [ 496.009657][ T3583] veth1_macvtap: entered promiscuous mode [ 496.650617][ T1110] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.654119][ T1110] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.701382][ T55] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.702471][ T55] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 497.238763][ T30] audit: type=1400 audit(496.710:139): avc: denied { mounton } for pid=3583 comm="syz-executor" path="/syzkaller.ruRDLX/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 497.288696][ T30] audit: type=1400 audit(496.750:140): avc: denied { mounton } for pid=3583 comm="syz-executor" path="/syzkaller.ruRDLX/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 497.421190][ T30] audit: type=1400 audit(496.910:141): avc: denied { mounton } for pid=3583 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 498.310558][ T30] audit: type=1400 audit(497.800:142): avc: denied { getopt } for pid=3706 comm="syz.2.43" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 499.074399][ T30] audit: type=1326 audit(498.560:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3709 comm="syz.2.55" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 499.089051][ T30] audit: type=1326 audit(498.570:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3709 comm="syz.2.55" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 499.102338][ T30] audit: type=1326 audit(498.590:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3709 comm="syz.2.55" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 499.110016][ T30] audit: type=1326 audit(498.600:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3709 comm="syz.2.55" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 499.124337][ T30] audit: type=1326 audit(498.610:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3709 comm="syz.2.55" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 499.138139][ T30] audit: type=1326 audit(498.610:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3709 comm="syz.2.55" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 500.489121][ T3714] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 500.494202][ T3714] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 513.379092][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 513.384589][ T30] audit: type=1400 audit(512.860:159): avc: denied { write } for pid=3719 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 513.389845][ T30] audit: type=1400 audit(512.880:160): avc: denied { nlmsg_write } for pid=3719 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 513.461659][ T3721] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 513.471459][ T3721] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 513.925755][ T30] audit: type=1400 audit(513.410:161): avc: denied { read } for pid=3724 comm="syz.1.61" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 513.930310][ T30] audit: type=1400 audit(513.410:162): avc: denied { open } for pid=3724 comm="syz.1.61" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 513.959835][ T30] audit: type=1400 audit(513.450:163): avc: denied { ioctl } for pid=3724 comm="syz.1.61" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 517.638628][ T30] audit: type=1400 audit(517.120:164): avc: denied { name_bind } for pid=3728 comm="syz.1.63" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 517.664298][ T30] audit: type=1400 audit(517.130:165): avc: denied { node_bind } for pid=3728 comm="syz.1.63" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 520.479644][ T30] audit: type=1400 audit(519.960:166): avc: denied { mount } for pid=3723 comm="syz.2.62" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 536.923613][ T30] audit: type=1400 audit(536.410:167): avc: denied { connect } for pid=3743 comm="syz.1.65" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 576.307393][ T30] audit: type=1400 audit(575.790:168): avc: denied { watch } for pid=3839 comm="syz.2.72" path="/9" dev="tmpfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 584.385518][ T3842] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 584.387180][ T3842] IPv6: NLM_F_CREATE should be set when creating new route [ 584.412354][ T3842] lo: entered allmulticast mode [ 584.508172][ T3842] tunl0: entered allmulticast mode [ 584.557905][ T3842] gre0: entered allmulticast mode [ 584.605667][ T3842] gretap0: entered allmulticast mode [ 584.664990][ T3842] erspan0: entered allmulticast mode [ 584.728909][ T3842] ip_vti0: entered allmulticast mode [ 584.769858][ T3842] ip6_vti0: entered allmulticast mode [ 584.815331][ T3842] sit0: entered allmulticast mode [ 584.881199][ T3842] ip6tnl0: entered allmulticast mode [ 584.933505][ T3842] ip6gre0: entered allmulticast mode [ 585.005213][ T3842] syz_tun: entered allmulticast mode [ 585.115192][ T3842] ip6gretap0: entered allmulticast mode [ 585.224015][ T3842] vcan0: entered allmulticast mode [ 585.371532][ T3842] bond0: entered allmulticast mode [ 585.375269][ T3842] bond_slave_0: entered allmulticast mode [ 585.404716][ T3842] bond_slave_1: entered allmulticast mode [ 585.540491][ T3842] dummy0: entered allmulticast mode [ 585.683328][ T3842] nlmon0: entered allmulticast mode [ 585.744746][ T3842] vxcan0: entered allmulticast mode [ 585.804626][ T3842] vxcan1: entered allmulticast mode [ 585.845843][ T3842] veth0: entered allmulticast mode [ 585.989864][ T3842] veth1: entered allmulticast mode [ 586.173826][ T3842] wg0: entered allmulticast mode [ 586.303466][ T3842] wg1: entered allmulticast mode [ 586.482646][ T3842] wg2: entered allmulticast mode [ 586.523379][ T3842] veth0_to_bridge: entered allmulticast mode [ 586.584759][ T3842] bridge_slave_0: entered allmulticast mode [ 586.721159][ T3842] veth1_to_bridge: entered allmulticast mode [ 586.795556][ T3842] bridge_slave_1: entered allmulticast mode [ 586.830531][ T3842] veth0_to_bond: entered allmulticast mode [ 586.921063][ T3842] veth1_to_bond: entered allmulticast mode [ 587.084818][ T3842] veth0_to_team: entered allmulticast mode [ 587.140047][ T3842] team_slave_0: entered allmulticast mode [ 587.159692][ T3842] veth1_to_team: entered allmulticast mode [ 587.212303][ T3842] team_slave_1: entered allmulticast mode [ 587.220910][ T3842] veth0_to_batadv: entered allmulticast mode [ 587.301253][ T3842] batadv_slave_0: entered allmulticast mode [ 587.443366][ T3842] veth1_to_batadv: entered allmulticast mode [ 587.504438][ T3842] batadv_slave_1: entered allmulticast mode [ 587.585549][ T3842] xfrm0: entered allmulticast mode [ 587.700147][ T3842] veth0_to_hsr: entered allmulticast mode [ 587.790536][ T3842] hsr_slave_0: entered allmulticast mode [ 587.901976][ T3842] veth1_to_hsr: entered allmulticast mode [ 588.118765][ T3842] hsr_slave_1: entered allmulticast mode [ 588.212092][ T3842] hsr0: entered allmulticast mode [ 588.267272][ T3842] veth1_virt_wifi: entered allmulticast mode [ 588.354649][ T3842] veth0_virt_wifi: entered allmulticast mode [ 588.481476][ T3842] veth1_vlan: entered allmulticast mode [ 588.559330][ T3842] veth0_vlan: entered allmulticast mode [ 588.805941][ T3842] vlan0: entered allmulticast mode [ 588.810391][ T3842] vlan1: entered allmulticast mode [ 588.883759][ T3842] macvlan0: entered allmulticast mode [ 589.004770][ T3842] macvlan1: entered allmulticast mode [ 589.075310][ T3842] ipvlan0: entered allmulticast mode [ 589.080004][ T3842] ipvlan1: entered allmulticast mode [ 589.091405][ T3842] veth1_macvtap: entered allmulticast mode [ 589.160471][ T3842] veth0_macvtap: entered allmulticast mode [ 589.238418][ T3842] macvtap0: entered allmulticast mode [ 589.315460][ T3842] macsec0: entered allmulticast mode [ 589.431436][ T3842] geneve0: entered allmulticast mode [ 589.522775][ T3842] geneve1: entered allmulticast mode [ 589.653368][ T3842] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 589.738867][ T3842] netdevsim netdevsim2 netdevsim1: entered allmulticast mode [ 589.799976][ T3842] netdevsim netdevsim2 netdevsim2: entered allmulticast mode [ 589.891280][ T3842] netdevsim netdevsim2 netdevsim3: entered allmulticast mode [ 589.943982][ T3817] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 589.945070][ T3817] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 589.953294][ T3817] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 589.954216][ T3817] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 591.557528][ T30] audit: type=1400 audit(591.040:169): avc: denied { bind } for pid=3849 comm="syz.2.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 591.619511][ T30] audit: type=1400 audit(591.100:170): avc: denied { setopt } for pid=3849 comm="syz.2.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 592.233422][ T30] audit: type=1400 audit(591.710:171): avc: denied { ioctl } for pid=3849 comm="syz.2.75" path="socket:[4856]" dev="sockfs" ino=4856 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 592.758195][ T30] audit: type=1326 audit(592.240:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3854 comm="syz.2.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 592.776044][ T30] audit: type=1326 audit(592.260:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3854 comm="syz.2.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 592.797232][ T30] audit: type=1326 audit(592.270:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3854 comm="syz.2.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 592.797964][ T30] audit: type=1326 audit(592.280:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3854 comm="syz.2.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 592.798319][ T30] audit: type=1326 audit(592.280:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3854 comm="syz.2.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 592.808730][ T30] audit: type=1326 audit(592.300:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3854 comm="syz.2.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 592.809601][ T30] audit: type=1326 audit(592.300:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3854 comm="syz.2.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 604.693336][ T3862] netlink: 180 bytes leftover after parsing attributes in process `syz.2.78'. [ 604.708689][ T3862] netlink: 12 bytes leftover after parsing attributes in process `syz.2.78'. [ 604.718092][ T3862] netlink: 8 bytes leftover after parsing attributes in process `syz.2.78'. [ 607.082690][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 607.083254][ T30] audit: type=1326 audit(606.570:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3867 comm="syz.2.81" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 607.133524][ T30] audit: type=1326 audit(606.620:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3867 comm="syz.2.81" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 607.161401][ T30] audit: type=1326 audit(606.640:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3867 comm="syz.2.81" exe="/syz-executor" sig=0 arch=c00000b7 syscall=175 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 607.189280][ T30] audit: type=1326 audit(606.680:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3867 comm="syz.2.81" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 607.207763][ T30] audit: type=1326 audit(606.690:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3867 comm="syz.2.81" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffab95c068 code=0x7ffc0000 [ 608.013849][ T3873] kernel profiling enabled (shift: 63) [ 608.014523][ T3873] profiling shift: 63 too large [ 608.964977][ T30] audit: type=1400 audit(608.444:191): avc: denied { map } for pid=3875 comm="syz.1.84" path="socket:[4919]" dev="sockfs" ino=4919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 615.728120][ T30] audit: type=1326 audit(614.214:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.1.87" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 615.732693][ T30] audit: type=1326 audit(614.224:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.1.87" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 615.742047][ T30] audit: type=1326 audit(614.224:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.1.87" exe="/syz-executor" sig=0 arch=c00000b7 syscall=220 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 615.758769][ T30] audit: type=1326 audit(614.314:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.1.87" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 615.769445][ T30] audit: type=1326 audit(614.584:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.1.87" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 615.776020][ T30] audit: type=1326 audit(614.754:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3889 comm="syz.1.87" exe="/syz-executor" sig=0 arch=c00000b7 syscall=115 compat=0 ip=0xffff99186788 code=0x7ffc0000 [ 615.781534][ T30] audit: type=1326 audit(614.924:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.1.87" exe="/syz-executor" sig=0 arch=c00000b7 syscall=424 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 616.060882][ T30] audit: type=1326 audit(614.984:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.1.87" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 616.061763][ T30] audit: type=1326 audit(615.044:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.1.87" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 617.764209][ T30] audit: type=1326 audit(616.334:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3889 comm="syz.1.87" exe="/syz-executor" sig=0 arch=c00000b7 syscall=93 compat=0 ip=0xffff9915c068 code=0x7ffc0000 [ 672.625184][ T3962] netlink: 96 bytes leftover after parsing attributes in process `syz.2.95'. [ 696.731921][ T30] audit: type=1400 audit(696.214:202): avc: denied { wake_alarm } for pid=3991 comm="syz.2.106" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 699.653075][ T30] audit: type=1400 audit(699.114:203): avc: denied { read write } for pid=3583 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 699.667227][ T30] audit: type=1400 audit(699.144:204): avc: denied { open } for pid=3583 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 699.677225][ T30] audit: type=1400 audit(699.144:205): avc: denied { ioctl } for pid=3583 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 699.936098][ T30] audit: type=1400 audit(699.414:206): avc: denied { create } for pid=4000 comm="syz.2.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 699.943771][ T30] audit: type=1400 audit(699.424:207): avc: denied { map_create } for pid=4000 comm="syz.2.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 699.955496][ T30] audit: type=1400 audit(699.434:208): avc: denied { bpf } for pid=4000 comm="syz.2.109" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 699.974274][ T30] audit: type=1400 audit(699.454:209): avc: denied { map_read map_write } for pid=4000 comm="syz.2.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 700.234346][ T30] audit: type=1400 audit(699.714:210): avc: denied { prog_load } for pid=3981 comm="syz.1.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 700.400107][ T30] audit: type=1400 audit(699.884:211): avc: denied { perfmon } for pid=3981 comm="syz.1.101" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 704.297617][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 704.302939][ T30] audit: type=1400 audit(703.754:215): avc: denied { execmem } for pid=4008 comm="syz.1.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 710.408146][ T4013] netlink: 28 bytes leftover after parsing attributes in process `syz.1.112'. [ 723.458545][ T30] audit: type=1400 audit(722.934:216): avc: denied { create } for pid=4016 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 723.498890][ T30] audit: type=1400 audit(722.974:217): avc: denied { module_request } for pid=4016 comm="syz.1.114" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 729.737128][ T30] audit: type=1400 audit(729.214:218): avc: denied { create } for pid=4027 comm="syz.2.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 729.772379][ T30] audit: type=1400 audit(729.254:219): avc: denied { write } for pid=4027 comm="syz.2.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 729.773466][ T30] audit: type=1400 audit(729.254:220): avc: denied { nlmsg_write } for pid=4027 comm="syz.2.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 734.572701][ T4032] capability: warning: `syz.2.117' uses 32-bit capabilities (legacy support in use) [ 741.939735][ T30] audit: type=1400 audit(741.424:221): avc: denied { read write } for pid=4038 comm="syz.2.120" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 741.941829][ T30] audit: type=1400 audit(741.424:222): avc: denied { open } for pid=4038 comm="syz.2.120" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 741.974039][ T30] audit: type=1400 audit(741.454:223): avc: denied { mounton } for pid=4038 comm="syz.2.120" path="/40/file0" dev="tmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 742.096863][ T30] audit: type=1400 audit(741.574:224): avc: denied { mount } for pid=4038 comm="syz.2.120" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 743.803085][ T30] audit: type=1400 audit(743.284:225): avc: denied { unmount } for pid=4038 comm="syz.2.120" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 744.178202][ T30] audit: type=1400 audit(743.654:226): avc: denied { write } for pid=4044 comm="syz.2.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 744.560999][ T30] audit: type=1400 audit(744.044:227): avc: denied { create } for pid=4046 comm="syz.2.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 744.573532][ T30] audit: type=1400 audit(744.054:228): avc: denied { setopt } for pid=4046 comm="syz.2.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 745.153904][ T30] audit: type=1400 audit(744.634:229): avc: denied { ioctl } for pid=4048 comm="syz.2.123" path="socket:[5097]" dev="sockfs" ino=5097 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 745.173886][ T30] audit: type=1400 audit(744.654:230): avc: denied { write } for pid=4048 comm="syz.2.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 748.319961][ T30] audit: type=1400 audit(747.794:231): avc: denied { read } for pid=4056 comm="syz.2.125" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 748.327604][ T30] audit: type=1400 audit(747.804:232): avc: denied { open } for pid=4056 comm="syz.2.125" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 748.385206][ T30] audit: type=1400 audit(747.864:233): avc: denied { ioctl } for pid=4056 comm="syz.2.125" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 756.612686][ T30] audit: type=1400 audit(756.094:234): avc: denied { write } for pid=4069 comm="syz.2.129" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 757.845667][ T30] audit: type=1400 audit(757.324:235): avc: denied { connect } for pid=4071 comm="syz.2.130" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 757.864208][ T30] audit: type=1400 audit(757.344:236): avc: denied { setopt } for pid=4071 comm="syz.2.130" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 757.914918][ T30] audit: type=1400 audit(757.394:237): avc: denied { write } for pid=4071 comm="syz.2.130" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 759.059258][ T30] audit: type=1400 audit(758.544:238): avc: denied { name_bind } for pid=4073 comm="syz.2.131" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 761.678798][ T4078] netlink: 132 bytes leftover after parsing attributes in process `syz.2.132'. [ 761.763316][ T30] audit: type=1400 audit(761.244:239): avc: denied { name_bind } for pid=4077 comm="syz.1.133" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 761.764013][ T30] audit: type=1400 audit(761.244:240): avc: denied { node_bind } for pid=4077 comm="syz.1.133" saddr=224.0.0.1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 763.080613][ T30] audit: type=1400 audit(762.564:241): avc: denied { read } for pid=4080 comm="syz.2.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 763.521493][ T30] audit: type=1400 audit(763.004:242): avc: denied { create } for pid=4085 comm="syz.2.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 763.607602][ T30] audit: type=1400 audit(763.084:243): avc: denied { setopt } for pid=4085 comm="syz.2.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 764.095963][ T4088] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 764.128959][ T30] audit: type=1400 audit(763.604:244): avc: denied { create } for pid=4087 comm="syz.2.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 764.143909][ T30] audit: type=1400 audit(763.624:245): avc: denied { ioctl } for pid=4087 comm="syz.2.136" path="socket:[5852]" dev="sockfs" ino=5852 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 764.185843][ T30] audit: type=1400 audit(763.664:246): avc: denied { read } for pid=4087 comm="syz.2.136" dev="nsfs" ino=4026532770 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 764.240381][ T4088] Zero length message leads to an empty skb [ 764.289686][ T30] audit: type=1400 audit(763.694:247): avc: denied { open } for pid=4087 comm="syz.2.136" path="net:[4026532770]" dev="nsfs" ino=4026532770 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 764.749921][ T30] audit: type=1400 audit(764.234:248): avc: denied { create } for pid=4090 comm="syz.2.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 767.942967][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 767.944059][ T30] audit: type=1400 audit(767.414:251): avc: denied { sys_module } for pid=4097 comm="syz.2.141" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 769.688149][ T30] audit: type=1400 audit(769.014:252): avc: denied { write } for pid=4094 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 772.339373][ T30] audit: type=1400 audit(771.794:253): avc: denied { ioctl } for pid=4105 comm="syz.2.142" path="socket:[5884]" dev="sockfs" ino=5884 ioctlcmd=0x8b26 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 778.829943][ T4123] syzkaller0: entered promiscuous mode [ 778.830668][ T4123] syzkaller0: entered allmulticast mode [ 783.752337][ T4141] syz_tun: entered allmulticast mode [ 783.945344][ T4140] syz_tun: left allmulticast mode [ 784.608941][ T30] audit: type=1400 audit(784.084:254): avc: denied { read write } for pid=4144 comm="syz.2.153" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 784.638861][ T30] audit: type=1400 audit(784.114:255): avc: denied { open } for pid=4144 comm="syz.2.153" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 784.674776][ T30] audit: type=1400 audit(784.154:256): avc: denied { ioctl } for pid=4144 comm="syz.2.153" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 784.722665][ T4146] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 784.792748][ T4146] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 785.578518][ T30] audit: type=1400 audit(785.054:257): avc: denied { create } for pid=4149 comm="syz.2.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 786.318995][ T30] audit: type=1400 audit(785.784:258): avc: denied { ioctl } for pid=4149 comm="syz.2.154" path="socket:[5973]" dev="sockfs" ino=5973 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 791.672563][ T4179] netlink: 12 bytes leftover after parsing attributes in process `syz.1.160'. [ 792.413497][ T4183] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 792.434130][ T4183] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 795.477538][ T30] audit: type=1400 audit(794.954:259): avc: denied { execute } for pid=4191 comm="syz.1.165" path="/71/blkio.bfq.io_serviced" dev="tmpfs" ino=377 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 800.326179][ T4198] netlink: 8 bytes leftover after parsing attributes in process `syz.1.167'. [ 802.905195][ T4201] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 802.964925][ T4201] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 805.190427][ T4211] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 805.208492][ T4211] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 807.503619][ T4224] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 807.532860][ T4224] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 809.963256][ T4236] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 810.003658][ T4236] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 812.013951][ T4249] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 812.029213][ T4249] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 825.369803][ T4299] bridge_slave_0: left allmulticast mode [ 831.217156][ T30] audit: type=1400 audit(830.698:260): avc: denied { create } for pid=4323 comm="syz.1.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 833.537249][ T4331] Driver unsupported XDP return value 0 on prog (id 10) dev N/A, expect packet loss! [ 841.708607][ T30] audit: type=1400 audit(841.188:261): avc: denied { create } for pid=4353 comm="syz.2.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 841.780962][ T30] audit: type=1400 audit(841.258:262): avc: denied { connect } for pid=4353 comm="syz.2.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 845.500643][ T4366] pim6reg1: entered promiscuous mode [ 845.501248][ T4366] pim6reg1: entered allmulticast mode [ 857.062501][ T30] audit: type=1400 audit(856.548:263): avc: denied { create } for pid=4407 comm="syz.2.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 865.997743][ T4439] ------------[ cut here ]------------ [ 865.998504][ T4439] verifier bug: not inlined functions bpf_probe_read_kernel_str#115 is missing func(1) [ 866.004089][ T4439] WARNING: CPU: 0 PID: 4439 at kernel/bpf/verifier.c:22838 do_misc_fixups+0xa938/0xcf04 [ 866.006720][ T4439] Modules linked in: [ 866.007830][ T4439] CPU: 0 UID: 0 PID: 4439 Comm: syz.1.277 Not tainted syzkaller #0 PREEMPT [ 866.008279][ T4439] Hardware name: linux,dummy-virt (DT) [ 866.008906][ T4439] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 866.009539][ T4439] pc : do_misc_fixups+0xa938/0xcf04 [ 866.010244][ T4439] lr : do_misc_fixups+0xa938/0xcf04 [ 866.010458][ T4439] sp : ffff8000a1107450 [ 866.010939][ T4439] x29: ffff8000a1107450 x28: ffff00001e4e8000 x27: ffff00001e4ee130 [ 866.011494][ T4439] x26: ffff00001e4ee148 x25: ffff00001e4e8000 x24: 0000000000000000 [ 866.011821][ T4439] x23: ffff00001e4ee128 x22: 1ffff00011aaf613 x21: ffff80008d57b098 [ 866.012192][ T4439] x20: ffff800085585740 x19: ffff80008556d6a0 x18: 0000000000000000 [ 866.012547][ T4439] x17: 0000000000000000 x16: ffff00006a08a4c4 x15: 0000ffffeb42fc28 [ 866.012854][ T4439] x14: 0000000000000000 x13: 0000000000000000 x12: ffff700014220df3 [ 866.013174][ T4439] x11: 1ffff00014220df2 x10: ffff700014220df2 x9 : dfff800000000000 [ 866.013545][ T4439] x8 : ffff8000a1106f98 x7 : ffff8000a11070c0 x6 : ffff8000a1107010 [ 866.013869][ T4439] x5 : ffff8000a1106ff8 x4 : 0000000000000000 x3 : 1fffe0000d41313e [ 866.014254][ T4439] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000017c5dac0 [ 866.014733][ T4439] Call trace: [ 866.015108][ T4439] do_misc_fixups+0xa938/0xcf04 (P) [ 866.015529][ T4439] bpf_check+0x3c84/0x9508 [ 866.015778][ T4439] bpf_prog_load+0xe2c/0x1b74 [ 866.016052][ T4439] __sys_bpf+0x9c4/0x29c8 [ 866.016404][ T4439] __arm64_sys_bpf+0x70/0xa4 [ 866.016769][ T4439] invoke_syscall+0x6c/0x258 [ 866.016992][ T4439] el0_svc_common.constprop.0+0xac/0x230 [ 866.017255][ T4439] do_el0_svc+0x40/0x58 [ 866.017518][ T4439] el0_svc+0x50/0x1a0 [ 866.017802][ T4439] el0t_64_sync_handler+0xa0/0xe4 [ 866.018093][ T4439] el0t_64_sync+0x198/0x19c [ 866.018651][ T4439] irq event stamp: 488 [ 866.018861][ T4439] hardirqs last enabled at (487): [] finish_task_switch.isra.0+0x1a8/0x854 [ 866.019294][ T4439] hardirqs last disabled at (488): [] el1_brk64+0x1c/0x48 [ 866.019642][ T4439] softirqs last enabled at (470): [] handle_softirqs+0x88c/0xdb4 [ 866.020096][ T4439] softirqs last disabled at (445): [] __do_softirq+0x14/0x20 [ 866.020537][ T4439] ---[ end trace 0000000000000000 ]--- [ 866.069044][ T30] audit: type=1400 audit(865.548:264): avc: denied { write } for pid=3317 comm="syz-executor" path="pipe:[2636]" dev="pipefs" ino=2636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 868.354474][ T3791] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 868.684255][ T3791] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 869.060333][ T3791] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 869.453252][ T3791] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 870.974076][ T30] audit: type=1400 audit(870.458:265): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 873.443554][ T3791] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 873.499893][ T3791] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 873.559384][ T3791] bond0 (unregistering): Released all slaves [ 873.902737][ T30] audit: type=1400 audit(873.378:266): avc: denied { search } for pid=3167 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 873.924899][ T30] audit: type=1400 audit(873.408:267): avc: denied { search } for pid=3167 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 873.925830][ T30] audit: type=1400 audit(873.408:268): avc: denied { search } for pid=3167 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 873.933876][ T30] audit: type=1400 audit(873.408:269): avc: denied { read } for pid=3167 comm="dhcpcd" name="n18" dev="tmpfs" ino=1705 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 873.934923][ T30] audit: type=1400 audit(873.408:270): avc: denied { open } for pid=3167 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1705 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 873.945020][ T30] audit: type=1400 audit(873.428:271): avc: denied { getattr } for pid=3167 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1705 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 874.055504][ T3791] hsr_slave_0: left promiscuous mode [ 874.075167][ T3791] hsr_slave_1: left promiscuous mode [ 874.241356][ T3791] veth1_macvtap: left promiscuous mode [ 874.242781][ T3791] veth0_macvtap: left promiscuous mode [ 874.244401][ T3791] veth1_vlan: left promiscuous mode [ 874.249784][ T3791] veth0_vlan: left promiscuous mode [ 881.091269][ T30] audit: type=1400 audit(880.578:272): avc: denied { read open } for pid=4448 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=719 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 881.094730][ T30] audit: type=1400 audit(880.578:273): avc: denied { getattr } for pid=4448 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=719 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 881.298101][ T30] audit: type=1400 audit(880.768:274): avc: denied { add_name } for pid=4447 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 881.299343][ T30] audit: type=1400 audit(880.778:275): avc: denied { create } for pid=4447 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 881.312680][ T30] audit: type=1400 audit(880.788:276): avc: denied { write } for pid=4447 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=1709 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 881.354684][ T30] audit: type=1400 audit(880.838:277): avc: denied { append } for pid=4447 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=1709 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 882.749591][ T30] audit: type=1400 audit(882.218:278): avc: denied { remove_name } for pid=4453 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1709 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 882.750751][ T30] audit: type=1400 audit(882.218:279): avc: denied { unlink } for pid=4453 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1709 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 884.417484][ T3791] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 884.489477][ T3791] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 884.539884][ T3791] bond0 (unregistering): Released all slaves [ 885.032525][ T3791] hsr_slave_0: left promiscuous mode [ 885.051321][ T3791] hsr_slave_1: left promiscuous mode VM DIAGNOSIS: 18:53:31 Registers: info registers vcpu 0 CPU#0 PC=ffff800081be77a4 X00=0000000000000002 X01=0000000000000007 X02=0000000000000000 X03=1fffe00001ddf62f X04=0000000000000018 X05=ffff800087ac2a40 X06=ffff700010f58548 X07=0000000000000001 X08=ffff800087ac2a40 X09=dfff800000000000 X10=ffff700010f58548 X11=1ffff00010f58548 X12=ffff700010f58549 X13=0000000000008000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff00000eefb080 X20=ffff80008d4db018 X21=ffff800087b3e7c0 X22=000000000000005d X23=dfff800000000000 X24=ffff00000ed0c039 X25=0000000000000005 X26=ffff00000eefb2d8 X27=ffff00000eefb080 X28=dfff800000000000 X29=ffff8000a1106a00 X30=ffff800081be7a30 SP=ffff8000a1106a00 PSTATE=800003c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=000000756c6c2570:6f6f6c2f7665642f Q02=65646e69620a0020:0000000000000005 Q03=ffffff000000ff00:0000000000000000 Q04=0000000000000000:fff000f000000000 Q05=bb448243222c92da:e3914ed4e87380b0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffeb42fc40:0000ffffeb42fc40 Q17=ffffff80ffffffd0:0000ffffeb42fc10 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000853b672c X00=ffff0000215f4000 X01=0000000000000000 X02=0000000000000140 X03=0000000000000004 X04=0000000000000000 X05=0000000000000040 X06=000000000000003f X07=0000000000000000 X08=ffff8000a2a675e0 X09=0000000000000000 X10=ffff70001454cefb X11=1ffff0001454ce94 X12=ffff70001454ce95 X13=0000000000000004 X14=0000000000000001 X15=ffff00006a0b1054 X16=ffff80008d4e0000 X17=ffff7fffe3003000 X18=0000000000000000 X19=ffff8000803f4fa0 X20=ffff800080010000 X21=ffff00000dc02140 X22=00000000002629b0 X23=0000000000000000 X24=ffff00000e964a00 X25=ffff00001f049c80 X26=ffff0000215f4000 X27=ffff800085e42b7c X28=dfff800000000000 X29=ffff8000a2a67830 X30=ffff80008544369c SP=ffff8000a2a67770 PSTATE=20000005 --C- EL1h FPCR=00000000 FPSR=00000000 Q00=7269762f73656369:7665642f7379732f Q01=31706f6f6c2f6b63:6f6c622f6c617574 Q02=622f6c6175747269:762f736563697665 Q03=65756575712f3170:6f6f6c2f6b636f6c Q04=3303330333033303:3303330333033303 Q05=bcbcbcc0bc000003:bcbcbcc0bc000003 Q06=0000000000000073:0000aaab0e75f3c0 Q07=0000000000000074:0000aaab0e75c600 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd8487fc0:0000ffffd8487fc0 Q17=ffffff80ffffffd0:0000ffffd8487f90 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000