last executing test programs: 20.748205697s ago: executing program 1 (id=67): syz_open_dev$audion(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000080), 0x0, 0x1) syz_open_dev$audion(&(0x7f00000000c0), 0x0, 0x2) syz_open_dev$audion(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$audion(&(0x7f0000000140), 0x1, 0x0) syz_open_dev$audion(&(0x7f0000000180), 0x1, 0x1) syz_open_dev$audion(&(0x7f00000001c0), 0x1, 0x2) syz_open_dev$audion(&(0x7f0000000200), 0x1, 0x800) syz_open_dev$audion(&(0x7f0000000240), 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000280), 0x2, 0x1) syz_open_dev$audion(&(0x7f00000002c0), 0x2, 0x2) syz_open_dev$audion(&(0x7f0000000300), 0x2, 0x800) syz_open_dev$audion(&(0x7f0000000340), 0x3, 0x0) syz_open_dev$audion(&(0x7f0000000380), 0x3, 0x1) syz_open_dev$audion(&(0x7f00000003c0), 0x3, 0x2) syz_open_dev$audion(&(0x7f0000000400), 0x3, 0x800) syz_open_dev$audion(&(0x7f0000000440), 0x4, 0x0) syz_open_dev$audion(&(0x7f0000000480), 0x4, 0x1) syz_open_dev$audion(&(0x7f00000004c0), 0x4, 0x2) syz_open_dev$audion(&(0x7f0000000500), 0x4, 0x800) 19.490217692s ago: executing program 1 (id=73): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vim2m', 0x2, 0x0) 19.351500563s ago: executing program 1 (id=74): pause() 15.270964965s ago: executing program 0 (id=116): openat(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill', 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill', 0x800, 0x0) 15.181380411s ago: executing program 0 (id=117): unshare(0x0) 15.154348984s ago: executing program 0 (id=118): socket$inet6_dccp(0xa, 0x6, 0x0) 14.060077567s ago: executing program 0 (id=119): mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 13.257277048s ago: executing program 0 (id=120): socket$packet(0x11, 0x2, 0x300) 9.317468219s ago: executing program 1 (id=122): syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x1) syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x2) syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x800) syz_open_dev$sg(&(0x7f0000000140), 0x1, 0x0) syz_open_dev$sg(&(0x7f0000000180), 0x1, 0x1) syz_open_dev$sg(&(0x7f00000001c0), 0x1, 0x2) syz_open_dev$sg(&(0x7f0000000200), 0x1, 0x800) syz_open_dev$sg(&(0x7f0000000240), 0x2, 0x0) syz_open_dev$sg(&(0x7f0000000280), 0x2, 0x1) syz_open_dev$sg(&(0x7f00000002c0), 0x2, 0x2) syz_open_dev$sg(&(0x7f0000000300), 0x2, 0x800) syz_open_dev$sg(&(0x7f0000000340), 0x3, 0x0) syz_open_dev$sg(&(0x7f0000000380), 0x3, 0x1) syz_open_dev$sg(&(0x7f00000003c0), 0x3, 0x2) syz_open_dev$sg(&(0x7f0000000400), 0x3, 0x800) syz_open_dev$sg(&(0x7f0000000440), 0x4, 0x0) syz_open_dev$sg(&(0x7f0000000480), 0x4, 0x1) syz_open_dev$sg(&(0x7f00000004c0), 0x4, 0x2) syz_open_dev$sg(&(0x7f0000000500), 0x4, 0x800) 9.241789715s ago: executing program 1 (id=123): clock_adjtime(0x0, &(0x7f0000000000)) 9.150346942s ago: executing program 1 (id=124): syz_open_dev$sndpcmc(&(0x7f0000000040), 0x1, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x1, 0x1) syz_open_dev$sndpcmc(&(0x7f00000000c0), 0x1, 0x2) syz_open_dev$sndpcmc(&(0x7f0000000100), 0x1, 0x800) syz_open_dev$sndpcmc(&(0x7f0000000140), 0xb, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000180), 0xb, 0x1) syz_open_dev$sndpcmc(&(0x7f00000001c0), 0xb, 0x2) syz_open_dev$sndpcmc(&(0x7f0000000200), 0xb, 0x800) syz_open_dev$sndpcmc(&(0x7f0000000240), 0x15, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000280), 0x15, 0x1) syz_open_dev$sndpcmc(&(0x7f00000002c0), 0x15, 0x2) syz_open_dev$sndpcmc(&(0x7f0000000300), 0x15, 0x800) syz_open_dev$sndpcmc(&(0x7f0000000340), 0x1f, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000380), 0x1f, 0x1) syz_open_dev$sndpcmc(&(0x7f00000003c0), 0x1f, 0x2) syz_open_dev$sndpcmc(&(0x7f0000000400), 0x1f, 0x800) syz_open_dev$sndpcmc(&(0x7f0000000440), 0x29, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000480), 0x29, 0x1) syz_open_dev$sndpcmc(&(0x7f00000004c0), 0x29, 0x2) syz_open_dev$sndpcmc(&(0x7f0000000500), 0x29, 0x800) 0s ago: executing program 0 (id=121): mmap(&(0x7efffffff000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000000)=nil, 0x1000000, 0x7, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0001000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:60820' (ED25519) to the list of known hosts. [ 121.586955][ T30] audit: type=1400 audit(121.230:46): avc: denied { name_bind } for pid=3314 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 121.877548][ T30] audit: type=1400 audit(121.520:47): avc: denied { execute } for pid=3315 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 121.886047][ T30] audit: type=1400 audit(121.520:48): avc: denied { execute_no_trans } for pid=3315 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 125.449258][ T30] audit: type=1400 audit(125.090:49): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 125.458165][ T30] audit: type=1400 audit(125.100:50): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 125.483253][ T3315] cgroup: Unknown subsys name 'net' [ 125.504003][ T30] audit: type=1400 audit(125.150:51): avc: denied { unmount } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 125.670234][ T3315] cgroup: Unknown subsys name 'cpuset' [ 125.701166][ T3315] cgroup: Unknown subsys name 'rlimit' [ 125.956190][ T30] audit: type=1400 audit(125.600:52): avc: denied { setattr } for pid=3315 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 125.961276][ T30] audit: type=1400 audit(125.600:53): avc: denied { create } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 125.970105][ T30] audit: type=1400 audit(125.610:54): avc: denied { write } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 125.975999][ T30] audit: type=1400 audit(125.610:55): avc: denied { module_request } for pid=3315 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 126.478141][ T3318] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 126.564092][ T3315] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 140.792642][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 140.793151][ T30] audit: type=1400 audit(140.430:63): avc: denied { execmem } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 140.870117][ T30] audit: type=1400 audit(140.510:64): avc: denied { read } for pid=3321 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 140.877443][ T30] audit: type=1400 audit(140.510:65): avc: denied { open } for pid=3321 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 140.887540][ T30] audit: type=1400 audit(140.530:66): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 141.535187][ T30] audit: type=1400 audit(141.180:67): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 141.546955][ T30] audit: type=1400 audit(141.190:68): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzkaller.aXLo3g/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 141.562756][ T30] audit: type=1400 audit(141.200:69): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 141.584595][ T30] audit: type=1400 audit(141.230:70): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.y1E7ao/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 141.594234][ T30] audit: type=1400 audit(141.240:71): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.y1E7ao/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3342 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 141.616012][ T30] audit: type=1400 audit(141.260:72): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 145.945165][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 145.945856][ T30] audit: type=1400 audit(145.590:96): avc: denied { create } for pid=3377 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 148.436477][ T30] audit: type=1400 audit(148.080:97): avc: denied { create } for pid=3398 comm="syz.0.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 149.375554][ T30] audit: type=1400 audit(149.020:98): avc: denied { create } for pid=3409 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 149.880157][ T30] audit: type=1400 audit(149.520:99): avc: denied { kexec_image_load } for pid=3415 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 150.804540][ T30] audit: type=1400 audit(150.450:100): avc: denied { create } for pid=3427 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 151.484095][ T30] audit: type=1400 audit(151.130:101): avc: denied { read } for pid=3434 comm="syz.0.106" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 151.495138][ T30] audit: type=1400 audit(151.140:102): avc: denied { open } for pid=3434 comm="syz.0.106" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 151.501140][ T30] audit: type=1400 audit(151.140:103): avc: denied { write } for pid=3434 comm="syz.0.106" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 151.586919][ T30] audit: type=1400 audit(151.230:104): avc: denied { create } for pid=3435 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 152.178716][ T30] audit: type=1400 audit(151.820:105): avc: denied { create } for pid=3441 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 154.606037][ T30] audit: type=1400 audit(154.250:106): avc: denied { mounton } for pid=3456 comm="syz-executor" path="/syzkaller.y3arX8/syz-tmp" dev="vda" ino=1882 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 154.619825][ T30] audit: type=1400 audit(154.260:107): avc: denied { mount } for pid=3456 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 154.650613][ T30] audit: type=1400 audit(154.290:108): avc: denied { mounton } for pid=3456 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1549 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 154.719017][ T30] audit: type=1400 audit(154.360:109): avc: denied { create } for pid=3457 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 155.090697][ T30] audit: type=1400 audit(154.730:110): avc: denied { sys_module } for pid=3459 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 158.456920][ T3459] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 158.471337][ T3459] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.262745][ T3459] hsr_slave_0: entered promiscuous mode [ 160.274685][ T3459] hsr_slave_1: entered promiscuous mode [ 161.208866][ T3459] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 161.238494][ T3459] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 161.254879][ T3459] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 161.269905][ T3459] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 162.487689][ T3459] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.024914][ T3459] veth0_vlan: entered promiscuous mode [ 167.055559][ T3459] veth1_vlan: entered promiscuous mode [ 167.190197][ T3459] veth0_macvtap: entered promiscuous mode [ 167.218008][ T3459] veth1_macvtap: entered promiscuous mode [ 167.347728][ T3459] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.348667][ T3459] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.349146][ T3459] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.349450][ T3459] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.776701][ T3459] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 171.435378][ T1569] ================================================================== [ 171.435795][ T1569] BUG: KASAN: global-out-of-bounds in fib6_clean_node+0x3a4/0x438 [ 171.436610][ T1569] Read of size 8 at addr ffff80008d46f228 by task kworker/u8:9/1569 [ 171.436702][ T1569] [ 171.437395][ T1569] CPU: 1 UID: 0 PID: 1569 Comm: kworker/u8:9 Not tainted 6.15.0-syzkaller-11061-g7f9039c524a3 #0 PREEMPT [ 171.437493][ T1569] Hardware name: linux,dummy-virt (DT) [ 171.437720][ T1569] Workqueue: events_unbound linkwatch_event [ 171.438076][ T1569] Call trace: [ 171.438268][ T1569] show_stack+0x18/0x24 (C) [ 171.438405][ T1569] dump_stack_lvl+0xa4/0xf4 [ 171.438464][ T1569] print_report+0xf4/0x60c [ 171.438509][ T1569] kasan_report+0xc8/0x108 [ 171.438546][ T1569] __asan_report_load8_noabort+0x20/0x2c [ 171.438610][ T1569] fib6_clean_node+0x3a4/0x438 [ 171.438649][ T1569] fib6_walk_continue+0x2ec/0x69c [ 171.438691][ T1569] fib6_walk+0x138/0x2e8 [ 171.438727][ T1569] fib6_clean_tree+0xd0/0x114 [ 171.438763][ T1569] __fib6_clean_all+0xd4/0x1f0 [ 171.438799][ T1569] fib6_clean_all+0x1c/0x28 [ 171.438838][ T1569] rt6_sync_down_dev+0x118/0x130 [ 171.438874][ T1569] addrconf_notify+0x9f4/0x113c [ 171.438926][ T1569] notifier_call_chain+0x11c/0x49c [ 171.438970][ T1569] raw_notifier_call_chain+0x18/0x24 [ 171.439010][ T1569] call_netdevice_notifiers_info+0x88/0xe8 [ 171.439053][ T1569] netif_state_change+0x118/0x2a8 [ 171.439092][ T1569] linkwatch_do_dev+0xd0/0x144 [ 171.439129][ T1569] __linkwatch_run_queue+0x294/0x618 [ 171.439166][ T1569] linkwatch_event+0x90/0xbc [ 171.439202][ T1569] process_one_work+0x7cc/0x18d4 [ 171.439241][ T1569] worker_thread+0x734/0xb84 [ 171.439280][ T1569] kthread+0x348/0x5fc [ 171.439316][ T1569] ret_from_fork+0x10/0x20 [ 171.439489][ T1569] [ 171.440180][ T1569] The buggy address belongs to the variable: [ 171.440251][ T1569] binder_devices+0x8/0x40 [ 171.440343][ T1569] [ 171.440499][ T1569] The buggy address belongs to the virtual mapping at [ 171.440499][ T1569] [ffff800087110000, ffff80008d4d1000) created by: [ 171.440499][ T1569] paging_init+0x3d0/0x560 [ 171.440603][ T1569] [ 171.440835][ T1569] The buggy address belongs to the physical page: [ 171.441190][ T1569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4d66f [ 171.441560][ T1569] flags: 0x1ffc00000002000(reserved|node=0|zone=0|lastcpupid=0x7ff) [ 171.442404][ T1569] raw: 01ffc00000002000 fffffdffc0359bc8 fffffdffc0359bc8 0000000000000000 [ 171.442505][ T1569] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 171.442668][ T1569] page dumped because: kasan: bad access detected [ 171.442752][ T1569] [ 171.442822][ T1569] Memory state around the buggy address: [ 171.443148][ T1569] ffff80008d46f100: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 171.443265][ T1569] ffff80008d46f180: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 171.443357][ T1569] >ffff80008d46f200: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 171.443450][ T1569] ^ [ 171.443579][ T1569] ffff80008d46f280: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 171.443678][ T1569] ffff80008d46f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 171.443809][ T1569] ================================================================== [ 171.444731][ T1569] Disabling lock debugging due to kernel taint SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 171.631677][ T178] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 171.825536][ T178] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 171.961044][ T178] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 172.127091][ T178] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 172.499560][ T30] audit: type=1400 audit(172.140:111): avc: denied { read } for pid=3165 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 174.509707][ T178] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 174.564004][ T178] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 174.610072][ T178] bond0 (unregistering): Released all slaves [ 184.913555][ T178] unregister_netdevice: waiting for geneve1 to become free. Usage count = 2 [ 184.915767][ T178] ref_tracker: geneve1@00000000fdf84995 has 1/1 users at [ 184.915767][ T178] netdev_get_by_index+0x5c/0xa4 [ 184.915767][ T178] fib6_nh_init+0x4b4/0x15bc [ 184.915767][ T178] ip6_route_info_create_nh+0x320/0xa60 [ 184.915767][ T178] ip6_route_add+0x40/0x1b4 [ 184.915767][ T178] addrconf_prefix_route+0x220/0x368 [ 184.915767][ T178] addrconf_notify+0xab8/0x113c [ 184.915767][ T178] notifier_call_chain+0x11c/0x49c [ 184.915767][ T178] raw_notifier_call_chain+0x18/0x24 [ 184.915767][ T178] call_netdevice_notifiers_info+0x88/0xe8 [ 184.915767][ T178] __dev_notify_flags+0xbc/0x20c [ 184.915767][ T178] netif_change_flags+0xe0/0x150 [ 184.915767][ T178] do_setlink.constprop.0+0x22a4/0x34d8 [ 184.915767][ T178] rtnl_newlink+0xd50/0x1810 [ 184.915767][ T178] rtnetlink_rcv_msg+0x65c/0x8d4 [ 184.915767][ T178] netlink_rcv_skb+0x198/0x334 [ 184.915767][ T178] rtnetlink_rcv+0x18/0x24 [ 184.915767][ T178] [ 184.921487][ T178] unregister_netdevice: waiting for geneve0 to become free. Usage count = 2 [ 184.922223][ T178] ref_tracker: geneve0@0000000079a61d9c has 1/1 users at [ 184.922223][ T178] netdev_get_by_index+0x5c/0xa4 [ 184.922223][ T178] fib6_nh_init+0x4b4/0x15bc [ 184.922223][ T178] ip6_route_info_create_nh+0x320/0xa60 [ 184.922223][ T178] ip6_route_add+0x40/0x1b4 [ 184.922223][ T178] addrconf_prefix_route+0x220/0x368 [ 184.922223][ T178] addrconf_notify+0xab8/0x113c [ 184.922223][ T178] notifier_call_chain+0x11c/0x49c [ 184.922223][ T178] raw_notifier_call_chain+0x18/0x24 [ 184.922223][ T178] call_netdevice_notifiers_info+0x88/0xe8 [ 184.922223][ T178] __dev_notify_flags+0xbc/0x20c [ 184.922223][ T178] netif_change_flags+0xe0/0x150 [ 184.922223][ T178] do_setlink.constprop.0+0x22a4/0x34d8 [ 184.922223][ T178] rtnl_newlink+0xd50/0x1810 [ 184.922223][ T178] rtnetlink_rcv_msg+0x65c/0x8d4 [ 184.922223][ T178] netlink_rcv_skb+0x198/0x334 [ 184.922223][ T178] rtnetlink_rcv+0x18/0x24 [ 184.922223][ T178] [ 184.927594][ T30] audit: type=1400 audit(184.570:112): avc: denied { read } for pid=3120 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 184.935043][ T30] audit: type=1400 audit(184.570:113): avc: denied { search } for pid=3120 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 184.938405][ T30] audit: type=1400 audit(184.580:114): avc: denied { search } for pid=3120 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 184.940069][ T30] audit: type=1400 audit(184.580:115): avc: denied { add_name } for pid=3120 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 184.942488][ T30] audit: type=1400 audit(184.580:116): avc: denied { create } for pid=3120 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 184.946053][ T30] audit: type=1400 audit(184.590:117): avc: denied { append open } for pid=3120 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 184.949350][ T30] audit: type=1400 audit(184.590:118): avc: denied { getattr } for pid=3120 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.093675][ T178] unregister_netdevice: waiting for geneve1 to become free. Usage count = 2 [ 195.095857][ T178] ref_tracker: geneve1@00000000fdf84995 has 1/1 users at [ 195.095857][ T178] netdev_get_by_index+0x5c/0xa4 [ 195.095857][ T178] fib6_nh_init+0x4b4/0x15bc [ 195.095857][ T178] ip6_route_info_create_nh+0x320/0xa60 [ 195.095857][ T178] ip6_route_add+0x40/0x1b4 [ 195.095857][ T178] addrconf_prefix_route+0x220/0x368 [ 195.095857][ T178] addrconf_notify+0xab8/0x113c [ 195.095857][ T178] notifier_call_chain+0x11c/0x49c [ 195.095857][ T178] raw_notifier_call_chain+0x18/0x24 [ 195.095857][ T178] call_netdevice_notifiers_info+0x88/0xe8 [ 195.095857][ T178] __dev_notify_flags+0xbc/0x20c [ 195.095857][ T178] netif_change_flags+0xe0/0x150 [ 195.095857][ T178] do_setlink.constprop.0+0x22a4/0x34d8 [ 195.095857][ T178] rtnl_newlink+0xd50/0x1810 [ 195.095857][ T178] rtnetlink_rcv_msg+0x65c/0x8d4 [ 195.095857][ T178] netlink_rcv_skb+0x198/0x334 [ 195.095857][ T178] rtnetlink_rcv+0x18/0x24 [ 195.095857][ T178] [ 195.096398][ T178] unregister_netdevice: waiting for geneve0 to become free. Usage count = 2 [ 195.097061][ T178] ref_tracker: geneve0@0000000079a61d9c has 1/1 users at [ 195.097061][ T178] netdev_get_by_index+0x5c/0xa4 [ 195.097061][ T178] fib6_nh_init+0x4b4/0x15bc [ 195.097061][ T178] ip6_route_info_create_nh+0x320/0xa60 [ 195.097061][ T178] ip6_route_add+0x40/0x1b4 [ 195.097061][ T178] addrconf_prefix_route+0x220/0x368 [ 195.097061][ T178] addrconf_notify+0xab8/0x113c [ 195.097061][ T178] notifier_call_chain+0x11c/0x49c [ 195.097061][ T178] raw_notifier_call_chain+0x18/0x24 [ 195.097061][ T178] call_netdevice_notifiers_info+0x88/0xe8 [ 195.097061][ T178] __dev_notify_flags+0xbc/0x20c [ 195.097061][ T178] netif_change_flags+0xe0/0x150 [ 195.097061][ T178] do_setlink.constprop.0+0x22a4/0x34d8 [ 195.097061][ T178] rtnl_newlink+0xd50/0x1810 [ 195.097061][ T178] rtnetlink_rcv_msg+0x65c/0x8d4 [ 195.097061][ T178] netlink_rcv_skb+0x198/0x334 [ 195.097061][ T178] rtnetlink_rcv+0x18/0x24 [ 195.097061][ T178] VM DIAGNOSIS: 21:23:54 Registers: info registers vcpu 0 CPU#0 PC=ffff800081b8c830 X00=0000000000000002 X01=0000000000000000 X02=0000000000000002 X03=dfff800000000000 X04=0000000000000018 X05=ffff80008d9e79e0 X06=ffff700011b3cf3c X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700011b3cf3c X11=1ffff00011b3cf3c X12=ffff700011b3cf3d X13=205d393635315420 X14=38752f72656b726f X15=7420746f4e20393a X16=36206465746e6961 X17=79732d302e35312e X18=0000000000000000 X19=ffff00000ed05080 X20=ffff80008d4db018 X21=ffff800087b29620 X22=0000000000000043 X23=dfff800000000000 X24=ffff00000ed16018 X25=0000000000000007 X26=0000000000000f01 X27=1fffe00001da0a5a X28=ffff00000ed052d0 X29=ffff80008d9e7990 X30=ffff800081b8cabc SP=ffff80008d9e7990 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080012260 X00=0000ffffe8efc5e8 X01=0000ffffaedf04a8 X02=0000ffffe8efc5a0 X03=0000000000000000 X04=0000000000000046 X05=0000000000000002 X06=736f6e1f666d6e6b X07=7f7f7f7f7f7f7f7f X08=0101010101010101 X09=0000000000000002 X10=0000000000000010 X11=0101010101010101 X12=0000ffffe8efc370 X13=0000000000000000 X14=0000000000000003 X15=0000000000000000 X16=0000ffffaee17cd8 X17=0000ffffaec2cbd0 X18=000000000000000a X19=0000ffffe8efc5e8 X20=000000000000000a X21=0000000000000019 X22=0000ffffaecff810 X23=0000ffffe8efc7c0 X24=0000000000000001 X25=0000ffffaedf04a8 X26=0000ffffaee18000 X27=0000ffffaee18000 X28=0000ffffaee18000 X29=0000ffffe8efc580 X30=0000ffffaec2cc28 SP=ffff8000a2078000 PSTATE=400003c5 -Z-- EL1h FPCR=00000000 FPSR=00000000 Q00=0000ffffe8efc8e0:0000ffffe8efc8e0 Q01=ffffff80ffffffc8:0000ffffe8efc8a0 Q02=0000000000000000:fffffff0fff00000 Q03=0000000000000000:000000000000ff00 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:cc00000c00000030 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000