last executing test programs: 6.054423654s ago: executing program 0 (id=291): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@newae={0x64, 0x1e, 0x101, 0x70bd2b, 0x25dfdbfb, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d5, 0x2, 0x2b}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0xb411, 0x34ff}, [@lifetime_val={0x24, 0x9, {0x786, 0x1, 0xfffffffffffffe00, 0x9}}]}, 0x64}}, 0x20008000) 5.783147815s ago: executing program 0 (id=292): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@chain) 5.518980055s ago: executing program 0 (id=294): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x128) pwrite64(r0, 0x0, 0x0, 0x9000) 5.151533164s ago: executing program 0 (id=296): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r3}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 4.742289495s ago: executing program 0 (id=299): r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f0000000040)='.\x00', 0x24000420) r1 = syz_io_uring_setup(0x4169, &(0x7f0000000200)={0x0, 0x0, 0x10100}, &(0x7f0000000480)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x4000, @fd=r0, 0x4, &(0x7f0000000080)=""/164, 0xa4, 0x14, 0x1}) io_uring_enter(r1, 0x48e9, 0x8daf, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) 4.301700069s ago: executing program 0 (id=300): socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, 0x2, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}]}, 0x48}}, 0x0) 2.108646988s ago: executing program 1 (id=308): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x0, 0xb, 0x0, 0x0, 0x7995}, 0xfcb5, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 1.881243656s ago: executing program 1 (id=309): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003780)=[{{&(0x7f0000000480)={0xa, 0x4e20, 0x101, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}, 0x1c, &(0x7f0000000c40)=[{&(0x7f0000000ac0)="c0", 0x1}], 0x1}}], 0x1, 0x88c0) listen(r0, 0x2000fff) accept(r0, 0x0, 0x0) 1.254281854s ago: executing program 1 (id=310): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = syz_io_uring_setup(0x832, &(0x7f0000000580)={0x0, 0x4cd1c, 0x10100, 0x3}, &(0x7f0000000000)=0x0, &(0x7f00000000c0)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f0000000380)={&(0x7f0000001000)={[{0x0}, {0x0}, {0x0}, {0x0}]}, 0x4}, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)='%pS \x00'}, 0x20) syz_io_uring_submit(r1, r2, &(0x7f00000003c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x20, 0x0, @fd_index=0x5, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) io_uring_enter(r0, 0x26c3, 0xdffffffb, 0x4c, 0x0, 0x0) 771.304381ms ago: executing program 1 (id=311): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, 0x0) 243.389572ms ago: executing program 1 (id=312): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, 0x0, 0x0) 0s ago: executing program 1 (id=313): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000040)="aa1d484ea0000000f7fc08fcd111fbdf23ea32db0e8f21d5bc27bd49eb067a0689fff2a41cfbf0e9", 0x28}], 0x1) process_madvise(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000180)}], 0x2, 0x13, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x44f0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:34561' (ED25519) to the list of known hosts. [ 145.385268][ T30] audit: type=1400 audit(144.960:46): avc: denied { name_bind } for pid=3304 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 145.696474][ T30] audit: type=1400 audit(145.270:47): avc: denied { execute } for pid=3305 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 145.704645][ T30] audit: type=1400 audit(145.280:48): avc: denied { execute_no_trans } for pid=3305 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 149.686556][ T30] audit: type=1400 audit(149.260:49): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 149.708840][ T30] audit: type=1400 audit(149.270:50): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 149.755858][ T3305] cgroup: Unknown subsys name 'net' [ 149.792439][ T30] audit: type=1400 audit(149.370:51): avc: denied { unmount } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 150.104613][ T3305] cgroup: Unknown subsys name 'cpuset' [ 150.160315][ T3305] cgroup: Unknown subsys name 'rlimit' [ 150.404419][ T30] audit: type=1400 audit(149.980:52): avc: denied { setattr } for pid=3305 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 150.415777][ T30] audit: type=1400 audit(149.980:53): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 150.418869][ T30] audit: type=1400 audit(149.990:54): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 150.814985][ T3307] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 150.827408][ T30] audit: type=1400 audit(150.400:55): avc: denied { relabelto } for pid=3307 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 150.835594][ T30] audit: type=1400 audit(150.410:56): avc: denied { write } for pid=3307 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 150.920766][ T30] audit: type=1400 audit(150.500:57): avc: denied { read } for pid=3305 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 150.925656][ T30] audit: type=1400 audit(150.500:58): avc: denied { open } for pid=3305 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 150.952577][ T3305] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 168.738722][ T30] audit: type=1400 audit(168.310:59): avc: denied { execmem } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 168.785104][ T30] audit: type=1400 audit(168.360:60): avc: denied { read } for pid=3310 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 168.785758][ T30] audit: type=1400 audit(168.360:61): avc: denied { read } for pid=3311 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 168.791600][ T30] audit: type=1400 audit(168.360:62): avc: denied { open } for pid=3310 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 168.806590][ T30] audit: type=1400 audit(168.380:63): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 168.851575][ T30] audit: type=1400 audit(168.430:64): avc: denied { module_request } for pid=3310 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 169.021068][ T30] audit: type=1400 audit(168.600:65): avc: denied { sys_module } for pid=3310 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 173.935537][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.951536][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.516623][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 174.566544][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 176.199532][ T3310] hsr_slave_0: entered promiscuous mode [ 176.214606][ T3310] hsr_slave_1: entered promiscuous mode [ 176.567008][ T3311] hsr_slave_0: entered promiscuous mode [ 176.572245][ T3311] hsr_slave_1: entered promiscuous mode [ 176.585793][ T3311] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 176.589177][ T3311] Cannot create hsr debugfs directory [ 178.098942][ T30] audit: type=1400 audit(177.670:66): avc: denied { create } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 178.099602][ T30] audit: type=1400 audit(177.670:67): avc: denied { write } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 178.100090][ T30] audit: type=1400 audit(177.670:68): avc: denied { read } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 178.109274][ T3310] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 178.176926][ T3310] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 178.206767][ T3310] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 178.278945][ T3310] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 178.546551][ T3311] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 178.586014][ T3311] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 178.614716][ T3311] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 178.672599][ T3311] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 180.450176][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.046879][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.103580][ T3310] veth0_vlan: entered promiscuous mode [ 189.190838][ T3310] veth1_vlan: entered promiscuous mode [ 189.394093][ T3311] veth0_vlan: entered promiscuous mode [ 189.486870][ T3310] veth0_macvtap: entered promiscuous mode [ 189.504384][ T3311] veth1_vlan: entered promiscuous mode [ 189.581502][ T3310] veth1_macvtap: entered promiscuous mode [ 189.896791][ T3311] veth0_macvtap: entered promiscuous mode [ 189.987198][ T3311] veth1_macvtap: entered promiscuous mode [ 190.063878][ T3310] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.065943][ T3310] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.070016][ T3310] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.071956][ T3310] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.671596][ T30] audit: type=1400 audit(190.230:69): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 190.713182][ T30] audit: type=1400 audit(190.290:70): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/syzkaller.Die7YV/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 190.716150][ T3311] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.717364][ T3311] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.725958][ T3311] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.734068][ T3311] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.734404][ T30] audit: type=1400 audit(190.310:71): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 190.765414][ T30] audit: type=1400 audit(190.340:72): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/syzkaller.Die7YV/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 190.805558][ T30] audit: type=1400 audit(190.380:73): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/syzkaller.Die7YV/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 190.870433][ T30] audit: type=1400 audit(190.450:74): avc: denied { unmount } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 190.894744][ T30] audit: type=1400 audit(190.470:75): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1550 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 190.942912][ T30] audit: type=1400 audit(190.510:76): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="gadgetfs" ino=3720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 191.006204][ T30] audit: type=1400 audit(190.580:77): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 191.079077][ T30] audit: type=1400 audit(190.640:78): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 191.432070][ T3310] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 195.023825][ T3477] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 195.384406][ T3478] netlink: 'syz.1.8': attribute type 10 has an invalid length. [ 195.385960][ T3478] netlink: 40 bytes leftover after parsing attributes in process `syz.1.8'. [ 195.503277][ T3477] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 195.637192][ T3478] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8'. [ 195.854166][ T3477] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 195.947039][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 195.961177][ T30] audit: type=1326 audit(195.520:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3479 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 195.963146][ T30] audit: type=1326 audit(195.530:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3479 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 195.967511][ T30] audit: type=1326 audit(195.540:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3479 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 195.985898][ T30] audit: type=1326 audit(195.560:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3479 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 195.999073][ T30] audit: type=1326 audit(195.560:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3479 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 196.005349][ T30] audit: type=1326 audit(195.560:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3479 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 196.017048][ T30] audit: type=1326 audit(195.570:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3479 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 196.018328][ T30] audit: type=1326 audit(195.570:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3479 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 196.018711][ T30] audit: type=1326 audit(195.580:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3479 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 196.018998][ T30] audit: type=1326 audit(195.580:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3479 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=25 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 196.162815][ T3477] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.866227][ T3477] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.147094][ T3477] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.234970][ T3477] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.322038][ T3477] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 198.384605][ T3493] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 198.599880][ T3493] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 198.782310][ T3493] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 199.051474][ T3493] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 199.585814][ T3493] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 199.671067][ T3493] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 199.731201][ T3493] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 199.782582][ T3493] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.554146][ T3495] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 200.756909][ T3495] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.045472][ T3495] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.072419][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 201.073474][ T30] audit: type=1400 audit(200.610:147): avc: denied { create } for pid=3494 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 201.946548][ T3504] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.031073][ T3495] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.127107][ T3504] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.287274][ T3504] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.444201][ T3504] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.825194][ T3504] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.896093][ T3504] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.953067][ T3504] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.009366][ T3504] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.370874][ T3495] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.432057][ T3495] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.482512][ T3495] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.531404][ T3495] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.020483][ T30] audit: type=1400 audit(203.600:148): avc: denied { allowed } for pid=3511 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 204.051143][ T30] audit: type=1400 audit(203.630:149): avc: denied { sqpoll } for pid=3511 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 204.085602][ T30] audit: type=1400 audit(203.660:150): avc: denied { name_bind } for pid=3511 comm="syz.0.22" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 204.092594][ T30] audit: type=1400 audit(203.660:151): avc: denied { node_bind } for pid=3511 comm="syz.0.22" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 205.496462][ T3518] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 205.635579][ T3518] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 205.745576][ T3518] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 205.935649][ T3518] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 206.935963][ T3518] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 207.030932][ T3518] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 207.093588][ T3518] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 207.153731][ T3518] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 207.316664][ T30] audit: type=1400 audit(206.890:152): avc: denied { create } for pid=3526 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 207.330191][ T30] audit: type=1400 audit(206.910:153): avc: denied { connect } for pid=3526 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 209.161652][ T30] audit: type=1400 audit(208.740:154): avc: denied { create } for pid=3528 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 209.172413][ T30] audit: type=1400 audit(208.750:155): avc: denied { connect } for pid=3528 comm="syz.1.29" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 209.186840][ T30] audit: type=1400 audit(208.760:156): avc: denied { write } for pid=3528 comm="syz.1.29" path="socket:[5203]" dev="sockfs" ino=5203 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 209.411372][ T3531] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 209.526075][ T3531] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 209.629796][ T3531] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 209.736444][ T3531] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.023660][ T30] audit: type=1400 audit(209.600:157): avc: denied { read } for pid=3532 comm="syz.0.31" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 210.026087][ T30] audit: type=1400 audit(209.600:158): avc: denied { open } for pid=3532 comm="syz.0.31" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 210.042666][ T30] audit: type=1400 audit(209.620:159): avc: denied { ioctl } for pid=3532 comm="syz.0.31" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 210.253563][ T3531] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 210.402860][ T3531] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 210.414088][ T30] audit: type=1400 audit(209.990:160): avc: denied { listen } for pid=3534 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 210.466803][ T3531] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 210.585498][ T3531] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 210.944493][ T30] audit: type=1400 audit(210.520:161): avc: denied { accept } for pid=3534 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 213.635669][ T30] audit: type=1400 audit(213.210:162): avc: denied { read write } for pid=3547 comm="syz.0.36" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 213.643910][ T30] audit: type=1400 audit(213.210:163): avc: denied { open } for pid=3547 comm="syz.0.36" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 213.658622][ T30] audit: type=1400 audit(213.230:164): avc: denied { ioctl } for pid=3547 comm="syz.0.36" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 214.247120][ T3552] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 214.481453][ T3552] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 214.597107][ T3552] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 214.816234][ T3552] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 215.242509][ T3552] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 215.356269][ T3552] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 215.506678][ T3552] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 215.573131][ T3552] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.044023][ T30] audit: type=1326 audit(218.620:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3573 comm="syz.1.47" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 219.046110][ T30] audit: type=1326 audit(218.620:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3573 comm="syz.1.47" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 219.050396][ T30] audit: type=1326 audit(218.630:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3573 comm="syz.1.47" exe="/syz-executor" sig=0 arch=c00000b7 syscall=102 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 219.052475][ T30] audit: type=1326 audit(218.630:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3573 comm="syz.1.47" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 219.853345][ T30] audit: type=1400 audit(219.430:169): avc: denied { read write } for pid=3579 comm="syz.1.50" name="virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 219.859083][ T30] audit: type=1400 audit(219.430:170): avc: denied { open } for pid=3579 comm="syz.1.50" path="/dev/virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 219.971303][ T30] audit: type=1400 audit(219.540:171): avc: denied { ioctl } for pid=3579 comm="syz.1.50" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 220.620499][ T3588] netlink: 28 bytes leftover after parsing attributes in process `syz.1.52'. [ 220.631335][ T3588] netem: change failed [ 221.263420][ T3594] netlink: 'syz.0.55': attribute type 21 has an invalid length. [ 221.264474][ T3594] IPv6: NLM_F_CREATE should be specified when creating new route [ 221.744237][ T30] audit: type=1400 audit(221.320:172): avc: denied { mount } for pid=3598 comm="syz.1.58" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 222.156757][ T30] audit: type=1400 audit(221.730:173): avc: denied { mount } for pid=3603 comm="syz.1.59" name="/" dev="configfs" ino=44 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 224.932206][ T30] audit: type=1400 audit(224.510:174): avc: denied { write } for pid=3610 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 225.442831][ T30] audit: type=1400 audit(225.020:175): avc: denied { create } for pid=3616 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 225.457399][ T30] audit: type=1400 audit(225.030:176): avc: denied { setopt } for pid=3616 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 226.856658][ T3629] netlink: 4 bytes leftover after parsing attributes in process `syz.1.70'. [ 227.073248][ T3629] Zero length message leads to an empty skb [ 227.652581][ T30] audit: type=1400 audit(227.220:177): avc: denied { write } for pid=3633 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 227.996009][ T30] audit: type=1400 audit(227.570:178): avc: denied { create } for pid=3635 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 228.048926][ T30] audit: type=1400 audit(227.620:179): avc: denied { connect } for pid=3635 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 228.115064][ T30] audit: type=1400 audit(227.690:180): avc: denied { create } for pid=3635 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 228.132943][ T30] audit: type=1400 audit(227.710:181): avc: denied { setopt } for pid=3635 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 228.154383][ T30] audit: type=1400 audit(227.730:182): avc: denied { write } for pid=3635 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 228.180945][ T30] audit: type=1400 audit(227.740:183): avc: denied { nlmsg_read } for pid=3635 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 230.438711][ T30] audit: type=1400 audit(230.010:184): avc: denied { map } for pid=3658 comm="syz.1.84" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5553 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 230.446229][ T30] audit: type=1400 audit(230.020:185): avc: denied { read write } for pid=3658 comm="syz.1.84" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5553 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 231.794072][ T30] audit: type=1326 audit(231.360:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.1.85" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 231.812027][ T30] audit: type=1326 audit(231.390:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.1.85" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 231.814708][ T30] audit: type=1326 audit(231.390:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.1.85" exe="/syz-executor" sig=0 arch=c00000b7 syscall=279 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 231.831882][ T30] audit: type=1326 audit(231.400:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.1.85" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 231.893471][ T30] audit: type=1326 audit(231.460:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.1.85" exe="/syz-executor" sig=0 arch=c00000b7 syscall=44 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 231.894195][ T30] audit: type=1326 audit(231.460:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.1.85" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 231.894534][ T30] audit: type=1326 audit(231.470:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.1.85" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 234.355331][ T30] audit: type=1400 audit(233.930:193): avc: denied { name_connect } for pid=3675 comm="syz.1.92" dest=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 236.884356][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 236.892965][ T30] audit: type=1400 audit(236.460:200): avc: denied { create } for pid=3691 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 236.911248][ T3693] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 239.840260][ T3703] syz_tun: entered promiscuous mode [ 239.866455][ T30] audit: type=1400 audit(239.110:201): avc: denied { ioctl } for pid=3691 comm="syz.0.99" path="socket:[5638]" dev="sockfs" ino=5638 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 247.479326][ T30] audit: type=1400 audit(247.050:202): avc: denied { block_suspend } for pid=3722 comm="syz.1.111" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 248.078794][ T30] audit: type=1400 audit(247.650:203): avc: denied { write } for pid=3726 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 249.603263][ T30] audit: type=1326 audit(249.180:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3737 comm="syz.1.118" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 249.611634][ T30] audit: type=1326 audit(249.180:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3737 comm="syz.1.118" exe="/syz-executor" sig=0 arch=c00000b7 syscall=217 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 249.618685][ T30] audit: type=1326 audit(249.190:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3737 comm="syz.1.118" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd5a7a8 code=0x7ffc0000 [ 251.636239][ T30] audit: type=1400 audit(251.210:207): avc: denied { prog_load } for pid=3751 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 251.655199][ T30] audit: type=1400 audit(251.230:208): avc: denied { bpf } for pid=3751 comm="syz.0.124" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 251.655884][ T30] audit: type=1400 audit(251.230:209): avc: denied { perfmon } for pid=3751 comm="syz.0.124" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 251.827365][ T30] audit: type=1400 audit(251.400:210): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 251.842548][ T30] audit: type=1400 audit(251.410:211): avc: denied { open } for pid=3311 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 252.515840][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 252.516401][ T30] audit: type=1400 audit(252.090:217): avc: denied { read } for pid=3760 comm="syz.1.129" dev="nsfs" ino=4026532721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 252.523596][ T30] audit: type=1400 audit(252.100:218): avc: denied { open } for pid=3760 comm="syz.1.129" path="net:[4026532721]" dev="nsfs" ino=4026532721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 252.540840][ T3762] netlink: 96 bytes leftover after parsing attributes in process `syz.1.129'. [ 252.732276][ T30] audit: type=1400 audit(252.310:219): avc: denied { create } for pid=3763 comm="syz.0.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 253.329333][ T30] audit: type=1400 audit(252.900:220): avc: denied { map_create } for pid=3768 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 253.350552][ T30] audit: type=1400 audit(252.900:221): avc: denied { map_read map_write } for pid=3768 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 253.564909][ T3773] syz.0.135 (3773): /proc/3771/oom_adj is deprecated, please use /proc/3771/oom_score_adj instead. [ 253.584873][ T30] audit: type=1400 audit(253.150:222): avc: denied { allowed } for pid=3772 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 253.586737][ T30] audit: type=1400 audit(253.160:223): avc: denied { sqpoll } for pid=3772 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 253.602425][ T30] audit: type=1400 audit(253.180:224): avc: denied { create } for pid=3772 comm="syz.1.134" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 254.468705][ T30] audit: type=1400 audit(254.040:225): avc: denied { execmem } for pid=3784 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 263.652081][ T30] audit: type=1400 audit(263.230:226): avc: denied { ioctl } for pid=3818 comm="syz.1.155" path="socket:[4826]" dev="sockfs" ino=4826 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 263.674953][ T30] audit: type=1400 audit(263.250:227): avc: denied { create } for pid=3818 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 263.710406][ T30] audit: type=1400 audit(263.280:228): avc: denied { name_bind } for pid=3818 comm="syz.1.155" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 263.712290][ T30] audit: type=1400 audit(263.290:229): avc: denied { node_bind } for pid=3818 comm="syz.1.155" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 263.767436][ T30] audit: type=1400 audit(263.310:230): avc: denied { module_request } for pid=3814 comm="syz.0.153" kmod="net-pf-16-proto-16-family-TIPC" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 264.846676][ T3827] capability: warning: `syz.1.158' uses deprecated v2 capabilities in a way that may be insecure [ 284.822279][ T30] audit: type=1400 audit(284.400:231): avc: denied { create } for pid=3848 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 284.844258][ T30] audit: type=1400 audit(284.420:232): avc: denied { write } for pid=3848 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 284.849334][ T30] audit: type=1400 audit(284.420:233): avc: denied { connect } for pid=3848 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 284.853742][ T30] audit: type=1400 audit(284.430:234): avc: denied { name_connect } for pid=3848 comm="syz.0.165" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 285.438640][ T30] audit: type=1326 audit(285.010:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.0.166" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 285.478892][ T30] audit: type=1326 audit(285.050:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.0.166" exe="/syz-executor" sig=0 arch=c00000b7 syscall=220 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 285.582529][ T30] audit: type=1326 audit(285.150:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.0.166" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 285.614200][ T30] audit: type=1326 audit(285.190:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.0.166" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 285.624122][ T30] audit: type=1326 audit(285.200:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.0.166" exe="/syz-executor" sig=0 arch=c00000b7 syscall=260 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 285.643417][ T30] audit: type=1326 audit(285.210:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3852 comm="syz.0.166" exe="/syz-executor" sig=0 arch=c00000b7 syscall=115 compat=0 ip=0xffffa0184ec8 code=0x7ffc0000 [ 287.741717][ T3854] netlink: 20 bytes leftover after parsing attributes in process `syz.0.167'. [ 291.818711][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 291.819211][ T30] audit: type=1326 audit(291.390:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3868 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 291.833008][ T30] audit: type=1326 audit(291.400:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3868 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 291.841070][ T30] audit: type=1400 audit(291.400:253): avc: denied { create } for pid=3868 comm="syz.0.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 291.851995][ T30] audit: type=1326 audit(291.410:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3868 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 291.853797][ T30] audit: type=1326 audit(291.430:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3868 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 291.885262][ T30] audit: type=1326 audit(291.440:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3868 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=208 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 291.885927][ T30] audit: type=1400 audit(291.450:257): avc: denied { setopt } for pid=3868 comm="syz.0.173" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 291.896068][ T30] audit: type=1326 audit(291.470:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3868 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 291.898495][ T30] audit: type=1326 audit(291.470:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3868 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 292.939955][ T30] audit: type=1326 audit(292.510:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3872 comm="syz.0.175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 294.764360][ T3877] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 294.765482][ T3877] IPv6: NLM_F_CREATE should be set when creating new route [ 294.766086][ T3877] IPv6: NLM_F_CREATE should be set when creating new route [ 294.766451][ T3877] IPv6: NLM_F_CREATE should be set when creating new route [ 295.255567][ T3879] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 297.142566][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 297.143111][ T30] audit: type=1326 audit(296.720:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3886 comm="syz.0.181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 297.163655][ T30] audit: type=1326 audit(296.740:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3886 comm="syz.0.181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 297.164268][ T30] audit: type=1326 audit(296.740:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3886 comm="syz.0.181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=227 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 297.164751][ T30] audit: type=1326 audit(296.740:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3886 comm="syz.0.181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 297.176152][ T30] audit: type=1326 audit(296.750:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3886 comm="syz.0.181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 298.009014][ T30] audit: type=1400 audit(297.580:281): avc: denied { create } for pid=3893 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 298.029130][ T30] audit: type=1400 audit(297.600:282): avc: denied { ioctl } for pid=3893 comm="syz.0.184" path="socket:[5012]" dev="sockfs" ino=5012 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 298.030955][ T30] audit: type=1400 audit(297.600:283): avc: denied { setopt } for pid=3893 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 298.054749][ T30] audit: type=1400 audit(297.630:284): avc: denied { write } for pid=3893 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 301.159722][ T3898] capability: warning: `syz.0.186' uses 32-bit capabilities (legacy support in use) [ 301.594438][ T3900] xt_TPROXY: Can be used only with -p tcp or -p udp [ 301.623467][ T3900] netlink: 14 bytes leftover after parsing attributes in process `+}[@'. [ 304.709842][ T30] audit: type=1400 audit(304.280:285): avc: denied { create } for pid=3916 comm="syz.0.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 304.722376][ T30] audit: type=1400 audit(304.300:286): avc: denied { setopt } for pid=3916 comm="syz.0.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 304.941933][ T30] audit: type=1400 audit(304.520:287): avc: denied { listen } for pid=3918 comm="syz.1.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 304.970697][ T30] audit: type=1400 audit(304.550:288): avc: denied { accept } for pid=3918 comm="syz.1.195" lport=54421 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 306.842041][ T30] audit: type=1400 audit(306.420:289): avc: denied { mount } for pid=3922 comm="syz.0.197" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 306.977141][ T30] audit: type=1400 audit(306.550:290): avc: denied { execute } for pid=3922 comm="syz.0.197" path="/95/memory.events" dev="tmpfs" ino=495 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 323.819552][ T30] audit: type=1400 audit(323.390:291): avc: denied { getopt } for pid=3969 comm="syz.0.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 324.618648][ T30] audit: type=1326 audit(324.190:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.0.219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 324.621857][ T30] audit: type=1326 audit(324.200:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.0.219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 324.652238][ T30] audit: type=1326 audit(324.230:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.0.219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 324.653993][ T30] audit: type=1326 audit(324.230:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.0.219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 324.663559][ T30] audit: type=1326 audit(324.240:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.0.219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 324.674100][ T30] audit: type=1326 audit(324.240:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.0.219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 324.677300][ T30] audit: type=1326 audit(324.250:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.0.219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 324.681034][ T30] audit: type=1326 audit(324.250:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.0.219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 324.683928][ T30] audit: type=1326 audit(324.250:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.0.219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa015a7a8 code=0x7ffc0000 [ 329.721129][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 329.722502][ T30] audit: type=1400 audit(329.290:310): avc: denied { load_policy } for pid=4004 comm="syz.1.230" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 329.730221][ T4005] SELinux: failed to load policy [ 334.476514][ T30] audit: type=1400 audit(334.050:311): avc: denied { setopt } for pid=4017 comm="syz.0.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 339.019369][ T4034] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 339.026456][ T30] audit: type=1400 audit(338.600:312): avc: denied { getopt } for pid=4033 comm="syz.1.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 339.050933][ T30] audit: type=1400 audit(338.630:313): avc: denied { create } for pid=4032 comm="syz.0.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 339.110449][ T30] audit: type=1400 audit(338.680:314): avc: denied { setopt } for pid=4032 comm="syz.0.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 341.756687][ T30] audit: type=1400 audit(341.330:315): avc: denied { name_connect } for pid=4044 comm="gtp" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 342.109190][ T4047] syz.1.248 uses obsolete (PF_INET,SOCK_PACKET) [ 345.162713][ T4057] netlink: 28 bytes leftover after parsing attributes in process `syz.0.252'. [ 345.163693][ T4057] netlink: 28 bytes leftover after parsing attributes in process `syz.0.252'. [ 345.689045][ T30] audit: type=1400 audit(345.260:316): avc: denied { write } for pid=4060 comm="syz.0.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 347.716918][ T30] audit: type=1400 audit(347.200:317): avc: denied { search } for pid=4070 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 347.718166][ T30] audit: type=1400 audit(347.200:318): avc: denied { search } for pid=4070 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 347.718727][ T30] audit: type=1400 audit(347.210:319): avc: denied { search } for pid=4070 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 347.719078][ T30] audit: type=1400 audit(347.210:320): avc: denied { search } for pid=4070 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 347.719412][ T30] audit: type=1400 audit(347.260:321): avc: denied { read open } for pid=4071 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 347.719838][ T30] audit: type=1400 audit(347.260:322): avc: denied { getattr } for pid=4071 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 347.815826][ T30] audit: type=1400 audit(347.390:323): avc: denied { add_name } for pid=4070 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 347.824201][ T30] audit: type=1400 audit(347.400:324): avc: denied { create } for pid=4070 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 347.845792][ T30] audit: type=1400 audit(347.420:325): avc: denied { write open } for pid=4070 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1725 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 351.082211][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 351.083205][ T30] audit: type=1400 audit(350.660:331): avc: denied { map } for pid=4084 comm="syz.1.262" path="socket:[7246]" dev="sockfs" ino=7246 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 351.092309][ T30] audit: type=1400 audit(350.670:332): avc: denied { read } for pid=4084 comm="syz.1.262" path="socket:[7246]" dev="sockfs" ino=7246 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 353.821620][ T30] audit: type=1400 audit(353.400:333): avc: denied { map } for pid=4094 comm="syz.1.267" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6290 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 353.823762][ T30] audit: type=1400 audit(353.400:334): avc: denied { read write } for pid=4094 comm="syz.1.267" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6290 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 355.169240][ T30] audit: type=1400 audit(354.740:335): avc: denied { read } for pid=4107 comm="syz.1.272" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 355.169936][ T30] audit: type=1400 audit(354.740:336): avc: denied { open } for pid=4107 comm="syz.1.272" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 355.201703][ T30] audit: type=1400 audit(354.770:337): avc: denied { ioctl } for pid=4107 comm="syz.1.272" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 356.008072][ T4112] netlink: 'syz.1.274': attribute type 7 has an invalid length. [ 356.483606][ T4114] syz.1.275 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 356.786160][ T30] audit: type=1400 audit(356.360:338): avc: denied { create } for pid=4115 comm="syz.1.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 356.794579][ T30] audit: type=1400 audit(356.370:339): avc: denied { connect } for pid=4115 comm="syz.1.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 357.133727][ T30] audit: type=1400 audit(356.699:340): avc: denied { read } for pid=4117 comm="syz.1.277" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 357.134356][ T30] audit: type=1400 audit(356.710:341): avc: denied { open } for pid=4117 comm="syz.1.277" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 357.617160][ T30] audit: type=1400 audit(357.190:342): avc: denied { read write } for pid=4117 comm="syz.1.277" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 357.619159][ T30] audit: type=1400 audit(357.190:343): avc: denied { open } for pid=4117 comm="syz.1.277" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 357.656313][ T30] audit: type=1400 audit(357.230:344): avc: denied { ioctl } for pid=4117 comm="syz.1.277" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 358.331176][ T4120] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=41664 sclass=netlink_route_socket pid=4120 comm=syz.1.278 [ 358.347014][ T30] audit: type=1400 audit(357.920:345): avc: denied { setopt } for pid=4119 comm="syz.1.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 358.565743][ T4120] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 358.794545][ T4120] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 358.994285][ T4122] xt_CT: You must specify a L4 protocol and not use inversions on it [ 359.054444][ T4120] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.489915][ T30] audit: type=1400 audit(359.070:346): avc: denied { create } for pid=4124 comm="syz.0.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 359.504440][ T30] audit: type=1400 audit(359.080:347): avc: denied { write } for pid=4124 comm="syz.0.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 360.122939][ T4120] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 360.703047][ T4120] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 360.893413][ T4131] wireguard0: entered promiscuous mode [ 361.255709][ T4120] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 361.328109][ T4120] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 361.427309][ T4120] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 361.513239][ T4133] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 361.588981][ T4133] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 363.730212][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 363.731524][ T30] audit: type=1400 audit(363.250:360): avc: denied { write } for pid=4151 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 363.732125][ T30] audit: type=1400 audit(363.250:361): avc: denied { nlmsg_write } for pid=4151 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 365.003330][ T30] audit: type=1400 audit(364.580:362): avc: denied { watch } for pid=4166 comm="syz.0.299" path="/143" dev="tmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 365.304355][ T4168] SELinux: failed to load policy [ 366.871202][ T4180] netlink: 'syz.1.305': attribute type 11 has an invalid length. [ 366.872224][ T4180] netlink: 28 bytes leftover after parsing attributes in process `syz.1.305'. [ 369.866941][ T4200] ------------[ cut here ]------------ [ 369.867374][ T4200] WARNING: CPU: 0 PID: 4200 at mm/page_alloc.c:4935 __alloc_frozen_pages_noprof+0xb7c/0x1f1c [ 369.869372][ T4200] Modules linked in: [ 369.871817][ T4200] CPU: 0 UID: 0 PID: 4200 Comm: syz.1.313 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 369.873361][ T4200] Hardware name: linux,dummy-virt (DT) [ 369.874018][ T4200] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 369.874411][ T4200] pc : __alloc_frozen_pages_noprof+0xb7c/0x1f1c [ 369.874728][ T4200] lr : __alloc_pages_noprof+0x14/0x114 [ 369.874999][ T4200] sp : ffff8000a00a71d0 [ 369.875335][ T4200] x29: ffff8000a00a71d0 x28: 0000000000000015 x27: ffff00000e99b038 [ 369.876047][ T4200] x26: 0000000000000001 x25: 0000000020000180 x24: 1ffff00014014f24 [ 369.876630][ T4200] x23: ffff8000810acda8 x22: 1ffff00014014e5c x21: 0000000200000000 [ 369.877202][ T4200] x20: 0000000000000000 x19: 0000000000000015 x18: 0000000000000000 [ 369.877848][ T4200] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000020000000 [ 369.878431][ T4200] x14: 1600000000000000 x13: 0000000000000006 x12: ffff700014014eeb [ 369.878925][ T4200] x11: 00000000f204f204 x10: 00000000f200f204 x9 : 00000000f2000000 [ 369.879557][ T4200] x8 : 00000000f2f2f2f2 x7 : 00000000f3f3f3f3 x6 : 0000000000000001 [ 369.880054][ T4200] x5 : ffff0000170b3c80 x4 : 0000000000000000 x3 : 0000000000000000 [ 369.880552][ T4200] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff800088b71b60 [ 369.881245][ T4200] Call trace: [ 369.881674][ T4200] __alloc_frozen_pages_noprof+0xb7c/0x1f1c (P) [ 369.882099][ T4200] __alloc_pages_noprof+0x14/0x114 [ 369.882408][ T4200] ___kmalloc_large_node+0x9c/0x1d8 [ 369.882686][ T4200] __kmalloc_large_node_noprof+0x28/0x88 [ 369.882952][ T4200] __kmalloc_noprof+0x360/0x4d0 [ 369.883207][ T4200] hashtab_init+0x150/0x298 [ 369.883532][ T4200] symtab_init+0x44/0x64 [ 369.883790][ T4200] policydb_read+0x5a0/0x2918 [ 369.884046][ T4200] security_load_policy+0x12c/0xd98 [ 369.884351][ T4200] sel_write_load+0x2d8/0x148c [ 369.884603][ T4200] vfs_write+0x1d8/0xad4 [ 369.884848][ T4200] ksys_write+0xec/0x1d8 [ 369.885088][ T4200] __arm64_sys_write+0x6c/0x9c [ 369.885416][ T4200] invoke_syscall+0x6c/0x258 [ 369.885680][ T4200] el0_svc_common.constprop.0+0xac/0x230 [ 369.885948][ T4200] do_el0_svc+0x40/0x58 [ 369.886188][ T4200] el0_svc+0x50/0x198 [ 369.886448][ T4200] el0t_64_sync_handler+0x10c/0x138 [ 369.886709][ T4200] el0t_64_sync+0x198/0x19c [ 369.887188][ T4200] irq event stamp: 540 [ 369.887606][ T4200] hardirqs last enabled at (539): [] kasan_quarantine_put+0x1c8/0x228 [ 369.888096][ T4200] hardirqs last disabled at (540): [] el1_dbg+0x24/0x9c [ 369.888516][ T4200] softirqs last enabled at (498): [] fpsimd_restore_current_state+0x44/0x6bc [ 369.888915][ T4200] softirqs last disabled at (496): [] fpsimd_restore_current_state+0x14/0x6bc [ 369.889403][ T4200] ---[ end trace 0000000000000000 ]--- [ 369.910017][ T4200] SELinux: failed to load policy SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 369.949150][ T30] audit: type=1400 audit(369.490:363): avc: denied { write } for pid=3305 comm="syz-executor" path="pipe:[3142]" dev="pipefs" ino=3142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 370.881744][ T100] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 371.020371][ T100] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 371.140241][ T100] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 371.273693][ T100] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 371.905561][ T30] audit: type=1400 audit(371.480:364): avc: denied { read } for pid=3155 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 375.032606][ T100] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 375.119939][ T100] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 375.190697][ T100] bond0 (unregistering): Released all slaves [ 375.606865][ T100] hsr_slave_0: left promiscuous mode [ 375.617064][ T100] hsr_slave_1: left promiscuous mode [ 375.684980][ T100] veth1_macvtap: left promiscuous mode [ 375.687242][ T100] veth0_macvtap: left promiscuous mode [ 375.690017][ T100] veth1_vlan: left promiscuous mode [ 375.691998][ T100] veth0_vlan: left promiscuous mode [ 383.476159][ T100] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 383.706992][ T100] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 383.866127][ T100] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 384.005481][ T100] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 387.624940][ T100] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 387.689699][ T100] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 387.750747][ T100] bond0 (unregistering): Released all slaves [ 388.077231][ T100] hsr_slave_0: left promiscuous mode [ 388.093595][ T100] hsr_slave_1: left promiscuous mode [ 388.144084][ T100] veth1_macvtap: left promiscuous mode [ 388.145582][ T100] veth0_macvtap: left promiscuous mode [ 388.147321][ T100] veth1_vlan: left promiscuous mode [ 388.149346][ T100] veth0_vlan: left promiscuous mode [ 395.832853][ T12] infiniband syz1: ib_query_port failed (-19) VM DIAGNOSIS: 04:06:07 Registers: info registers vcpu 0 CPU#0 PC=ffff8000854975d8 X00=0000000000000000 X01=0000000000000000 X02=dfff800000000000 X03=0000000000000003 X04=0000000000000002 X05=1ffff00014014d0a X06=0000000000000000 X07=ffff700014014ce8 X08=0000000041b58ab3 X09=ffff8000a00a66a4 X10=0000000000000000 X11=0000000000000000 X12=0000000000000000 X13=00000000ffffffff X14=0000000000000001 X15=0000000000000007 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=0000000000000002 X20=ffff8000a00a6850 X21=ffff8000a00a6853 X22=0000000000000002 X23=1ffff00014014d0a X24=ffff8000a00a6852 X25=0000000000000002 X26=0000000000000004 X27=ffff8000a00a6ac9 X28=0000000000000003 X29=ffff8000a00a6750 X30=ffff8000854a5b0c SP=ffff8000a00a6750 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffc31f61f0:8664c95c9cd87d00 Q02=0000ffffc31f61d0:ffffff80ffffffd8 Q03=0000ffffc31f6280:0000ffffc31f6280 Q04=0000ffffc31f6280:0000ffffbcd36888 Q05=0000ffffc31f6250:0000ffffc31f6280 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc31f64a0:0000ffffc31f64a0 Q17=ffffff80ffffffd0:0000ffffc31f6470 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000854b8550 X00=ffff80008f1373c8 X01=ffff000014c09e40 X02=dfff800000000000 X03=1fffe000029813c9 X04=ffff700011e26e87 X05=0000000000000000 X06=ffff8000844d7000 X07=ffff80008f137590 X08=0000000000000491 X09=ffff8000897c2000 X10=ffff600002db5758 X11=1fffe000040cebab X12=ffff6000040cebac X13=0000000000000000 X14=ffff00006a0af3b0 X15=000000002005ec80 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff80008f137520 X20=ffff000014c09e40 X21=ffff000014c09e40 X22=0000000000000000 X23=ffff8000854bab74 X24=ffff80008f137750 X25=ffff000016dab9c0 X26=0000000000000000 X27=ffff80008f137790 X28=ffff000020675c80 X29=ffff80008f137580 X30=ffff8000809aa66c SP=ffff80008f137670 PSTATE=000000c5 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=742064656c696146:0000000000006425 Q02=0000000000000000:0000f00f00000000 Q03=0000000000000000:ffffffffffff00ff Q04=0000000000000000:00000000ffffff0f Q05=0000000000000000:00000000cccccc00 Q06=0000000000000073:0000aaaad60293e0 Q07=0000000000000074:0000aaaad6026620 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc9f20e00:0000ffffc9f20e00 Q17=ffffff80ffffffd8:0000ffffc9f20dd0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000