last executing test programs: 56.103818633s ago: executing program 1 (id=145): r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000140)={0x7, 0xfff7, 0x8, 0x3, 0x17, "a9b39ba517c50901"}) 55.440056467s ago: executing program 1 (id=146): r0 = socket(0x40000000015, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeeb, 0x8031, 0xffffffffffffffff, 0xc36e5000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) semtimedop(0x0, 0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x1, 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000080), &(0x7f0000001100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, &(0x7f0000000580)="303e3080020000000900f190c9", 0xd, r5) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0), 0x4) close(0x3) 38.582598131s ago: executing program 0 (id=152): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) 37.866223948s ago: executing program 0 (id=153): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 30.930589546s ago: executing program 1 (id=154): r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) writev(r0, &(0x7f0000001740)=[{&(0x7f0000000040)="db", 0x1}], 0x1) r1 = syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000100)) r2 = syz_open_dev$sndpcmp(&(0x7f00000001c0), 0x0, 0xa2c65) socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$SNDRV_PCM_IOCTL_REWIND(r2, 0xc0844123, &(0x7f0000000180)=0x4) 29.80901233s ago: executing program 1 (id=155): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$TCSETAW(r0, 0x5407, 0x0) 28.705174023s ago: executing program 1 (id=156): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000001400)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}, @NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d103"}]}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xa4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000801}, 0x8000) 17.315407585s ago: executing program 0 (id=157): unshare(0x22020400) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 16.79156117s ago: executing program 0 (id=158): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) tgkill(r0, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) capget(&(0x7f0000000000)={0x20080522, 0xffffffffffffffff}, &(0x7f0000000040)) connect$netlink(0xffffffffffffffff, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[], 0x50) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "108f84", 0x18, 0x3a, 0xff, @remote, @local, {[], @ndisc_na={0x92, 0x0, 0x0, 0x0, '\x00', @ipv4={'\x00', '\xff\xff', @multicast2}}}}}}}, 0x0) userfaultfd(0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r4) r6 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast2, @multicast1}, &(0x7f00000001c0)=0xc) sendmsg$xdp(r6, &(0x7f0000000340)={&(0x7f0000000200)={0x2c, 0x3, r7, 0x7}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000280)="40334cb6d3bc6aeb89666fd72c0a5e2eff2c0f1c5f6205aa3b7ef306340937e48a5591f5294dd96e4833214d800bba71", 0x30}, {&(0x7f00000005c0)="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", 0xff}, {&(0x7f00000007c0)="27d038b9e560b67308902dd3ed063b37560a0c5bcf73366484fa947a11bb54e67ba90de8fa0396be4c3d4ac8aef62d26e821bc403fc03f5fb3277ca33f95ed6d365a8d5f9347fc9c5c9b5f64eb7d272611c4d87fcd365ab71f90c9e9468f4258bdeada3b79f3a0902cd5b52d0a0feb90ee8a4a8a2429ccf006a9c14ba32c1c08bb9b4999895b61613d36491dbe6dd5bdd9a90dd662ec3b3671a045b0d44a4339a55e9e8e30f83d0a3b36a14f0bdd86c04855f626244c53f97344e6c59f0599ce85cdcefc42effc68a96bc4c2ef999e0d7675e29ca604b5c30ae59fb00e6622ffbd4e41862a68b92a2c300bf39b0ae932f17ee5a6f152", 0xf6}, {&(0x7f00000008c0)="90e57ed26323104fca52b91ff1d19b95e64a4dab2327f2807ea04042ec8d2b3d491dfe7c5687e81a440f8da24cf7f7e1b53ac8c7c78e105167337457d130a11d7a3c76d7cb558f2c925c3a3446f5499698b1d23435be3a47a4a2c081e0c70756cda02764465d8a6e49a2f46593e48f19bfe49f00989767a66a0544b806d86809164717a19058a536db8c74200434ec0ddcb112933360e5de29095c82dc0c04c7149ab7a1fde0f1b57e528f7ac3f20d6badb77cb0092853b558d618146a57193fecc29f4a1a36ee77f38f07", 0xcb}], 0x4, 0x0, 0x0, 0x44801}, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB='ya\x00\x00\x00\x00\x00\x00\x00\x00~'], 0x1c}}, 0x4000054) 5.355739315s ago: executing program 1 (id=159): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() fcntl$setownex(r3, 0xf, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r3, 0x0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 1.028186012s ago: executing program 0 (id=160): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$TCSETAW(r0, 0x5407, 0x0) 0s ago: executing program 0 (id=161): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000400)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)="f7", 0x1}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/73, 0xffffff19}], 0x1}, 0xf0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:40749' (ED25519) to the list of known hosts. [ 266.947885][ T30] audit: type=1400 audit(266.350:46): avc: denied { name_bind } for pid=3323 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 267.624176][ T30] audit: type=1400 audit(267.030:47): avc: denied { execute } for pid=3324 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 267.635001][ T30] audit: type=1400 audit(267.040:48): avc: denied { execute_no_trans } for pid=3324 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 278.105779][ T30] audit: type=1400 audit(277.510:49): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 278.178875][ T30] audit: type=1400 audit(277.580:50): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 278.228921][ T3324] cgroup: Unknown subsys name 'net' [ 278.306523][ T30] audit: type=1400 audit(277.710:51): avc: denied { unmount } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 278.652098][ T3324] cgroup: Unknown subsys name 'cpuset' [ 278.742919][ T3324] cgroup: Unknown subsys name 'rlimit' [ 279.065169][ T30] audit: type=1400 audit(278.470:52): avc: denied { setattr } for pid=3324 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.079657][ T30] audit: type=1400 audit(278.480:53): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 279.085765][ T30] audit: type=1400 audit(278.490:54): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 279.697664][ T3326] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 279.710438][ T30] audit: type=1400 audit(279.110:55): avc: denied { relabelto } for pid=3326 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 279.723384][ T30] audit: type=1400 audit(279.130:56): avc: denied { write } for pid=3326 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 279.911469][ T30] audit: type=1400 audit(279.310:57): avc: denied { read } for pid=3324 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 279.922230][ T30] audit: type=1400 audit(279.320:58): avc: denied { open } for pid=3324 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 279.966707][ T3324] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 318.955857][ T30] audit: type=1400 audit(318.360:59): avc: denied { execmem } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 319.066200][ T30] audit: type=1400 audit(318.470:60): avc: denied { read } for pid=3329 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 319.071297][ T30] audit: type=1400 audit(318.470:61): avc: denied { open } for pid=3329 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 319.081789][ T30] audit: type=1400 audit(318.490:62): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 319.140658][ T30] audit: type=1400 audit(318.550:63): avc: denied { module_request } for pid=3329 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 319.373214][ T30] audit: type=1400 audit(318.780:64): avc: denied { sys_module } for pid=3329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 329.256378][ T3329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 329.414157][ T3329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 329.454856][ T3330] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 329.682320][ T3330] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 334.633961][ T3329] hsr_slave_0: entered promiscuous mode [ 334.663615][ T3329] hsr_slave_1: entered promiscuous mode [ 334.909871][ T3330] hsr_slave_0: entered promiscuous mode [ 334.925271][ T3330] hsr_slave_1: entered promiscuous mode [ 334.947590][ T3330] debugfs: 'hsr0' already exists in 'hsr' [ 334.953873][ T3330] Cannot create hsr debugfs directory [ 338.723054][ T30] audit: type=1400 audit(338.130:65): avc: denied { create } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 338.737591][ T30] audit: type=1400 audit(338.140:66): avc: denied { write } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 338.763513][ T30] audit: type=1400 audit(338.150:67): avc: denied { read } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 338.785964][ T3329] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 338.896984][ T3329] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 339.025519][ T3329] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 339.071584][ T3329] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 340.218127][ T3330] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 340.365419][ T3330] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 340.545979][ T3330] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 340.620532][ T3330] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 344.377668][ T3329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 345.673876][ T3330] 8021q: adding VLAN 0 to HW filter on device bond0 [ 360.793470][ T3329] veth0_vlan: entered promiscuous mode [ 360.855024][ T3329] veth1_vlan: entered promiscuous mode [ 361.306590][ T3330] veth0_vlan: entered promiscuous mode [ 361.507726][ T3330] veth1_vlan: entered promiscuous mode [ 361.697782][ T3329] veth0_macvtap: entered promiscuous mode [ 361.902213][ T3329] veth1_macvtap: entered promiscuous mode [ 362.472490][ T3330] veth0_macvtap: entered promiscuous mode [ 362.696557][ T3330] veth1_macvtap: entered promiscuous mode [ 362.972611][ T146] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.984981][ T146] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 363.013566][ T146] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 363.015214][ T146] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 363.839037][ T1530] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 363.841821][ T1530] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 363.933756][ T1530] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.007289][ T30] audit: type=1400 audit(363.410:68): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.OCzTwf/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 364.020388][ T1530] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.039190][ T30] audit: type=1400 audit(363.420:69): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 364.081284][ T30] audit: type=1400 audit(363.490:70): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.OCzTwf/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 364.204757][ T30] audit: type=1400 audit(363.610:71): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 364.253651][ T30] audit: type=1400 audit(363.660:72): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.OCzTwf/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 364.285479][ T30] audit: type=1400 audit(363.690:73): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.OCzTwf/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3022 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 364.530515][ T30] audit: type=1400 audit(363.910:74): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 364.611354][ T30] audit: type=1400 audit(364.020:75): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 364.630111][ T30] audit: type=1400 audit(364.040:76): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="gadgetfs" ino=3033 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 364.702186][ T30] audit: type=1400 audit(364.110:77): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 365.291861][ T3329] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 375.300624][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 375.302848][ T30] audit: type=1400 audit(374.700:83): avc: denied { prog_load } for pid=3481 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 375.326530][ T30] audit: type=1400 audit(374.730:84): avc: denied { bpf } for pid=3481 comm="syz.0.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 375.327540][ T30] audit: type=1400 audit(374.730:85): avc: denied { perfmon } for pid=3481 comm="syz.0.1" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 375.400636][ T30] audit: type=1400 audit(374.800:86): avc: denied { append } for pid=3481 comm="syz.0.1" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 376.163472][ T30] audit: type=1400 audit(375.570:87): avc: denied { map_create } for pid=3483 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 376.356830][ T30] audit: type=1400 audit(375.760:88): avc: denied { create } for pid=3483 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 376.435042][ T30] audit: type=1400 audit(375.820:89): avc: denied { connect } for pid=3483 comm="syz.1.2" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 376.540104][ T30] audit: type=1400 audit(375.930:90): avc: denied { write } for pid=3483 comm="syz.1.2" laddr=fe80::13 lport=60 faddr=fe80::aa fport=20132 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 394.674079][ T30] audit: type=1400 audit(394.080:91): avc: denied { create } for pid=3493 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 394.696663][ T30] audit: type=1400 audit(394.100:92): avc: denied { write } for pid=3493 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 396.235539][ T30] audit: type=1400 audit(395.640:93): avc: denied { create } for pid=3495 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 396.279791][ T30] audit: type=1400 audit(395.680:94): avc: denied { write } for pid=3495 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 410.524606][ T3507] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 419.074239][ T30] audit: type=1400 audit(418.480:95): avc: denied { map_read map_write } for pid=3513 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 434.113687][ T30] audit: type=1400 audit(433.520:96): avc: denied { create } for pid=3531 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 434.134273][ T30] audit: type=1400 audit(433.540:97): avc: denied { name_bind } for pid=3531 comm="syz.0.15" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 447.372490][ T30] audit: type=1400 audit(446.780:98): avc: denied { create } for pid=3538 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 447.412057][ T30] audit: type=1400 audit(446.820:99): avc: denied { setopt } for pid=3538 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 448.833568][ T30] audit: type=1400 audit(448.240:100): avc: denied { create } for pid=3544 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 448.867358][ T30] audit: type=1400 audit(448.270:101): avc: denied { name_bind } for pid=3544 comm="syz.0.20" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 448.885221][ T30] audit: type=1400 audit(448.290:102): avc: denied { node_bind } for pid=3544 comm="syz.0.20" saddr=::ffff:127.0.0.1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 449.685242][ T30] audit: type=1400 audit(449.090:103): avc: denied { read write } for pid=3546 comm="syz.0.21" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 449.712138][ T30] audit: type=1400 audit(449.090:104): avc: denied { read write open } for pid=3546 comm="syz.0.21" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 449.715582][ T30] audit: type=1400 audit(449.120:105): avc: denied { ioctl } for pid=3546 comm="syz.0.21" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x4c81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 473.539449][ T3565] syz.0.27 uses obsolete (PF_INET,SOCK_PACKET) [ 473.593479][ T30] audit: type=1400 audit(473.000:106): avc: denied { ioctl } for pid=3564 comm="syz.0.27" path="socket:[4075]" dev="sockfs" ino=4075 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 476.439255][ T30] audit: type=1400 audit(475.840:107): avc: denied { write } for pid=3559 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 478.243429][ T30] audit: type=1400 audit(477.640:108): avc: denied { create } for pid=3574 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 478.319971][ T30] audit: type=1400 audit(477.720:109): avc: denied { write } for pid=3574 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 490.577905][ T30] audit: type=1400 audit(489.980:110): avc: denied { create } for pid=3646 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 502.562410][ T30] audit: type=1400 audit(501.970:111): avc: denied { read } for pid=3657 comm="syz.1.38" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 502.587446][ T30] audit: type=1400 audit(501.980:112): avc: denied { open } for pid=3657 comm="syz.1.38" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 502.602703][ T30] audit: type=1400 audit(501.990:113): avc: denied { ioctl } for pid=3657 comm="syz.1.38" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 513.492817][ T30] audit: type=1400 audit(512.900:114): avc: denied { create } for pid=3672 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 513.537498][ T30] audit: type=1400 audit(512.930:115): avc: denied { write } for pid=3672 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 513.551956][ T30] audit: type=1400 audit(512.940:116): avc: denied { nlmsg_write } for pid=3672 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 519.515525][ T30] audit: type=1400 audit(518.920:117): avc: denied { read write } for pid=3676 comm="syz.0.46" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 519.546460][ T30] audit: type=1400 audit(518.940:118): avc: denied { open } for pid=3676 comm="syz.0.46" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 531.121431][ T30] audit: type=1400 audit(530.510:119): avc: denied { bind } for pid=3690 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 531.131960][ T30] audit: type=1400 audit(530.540:120): avc: denied { setopt } for pid=3690 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 531.215733][ T30] audit: type=1400 audit(530.620:121): avc: denied { prog_run } for pid=3687 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 531.240979][ T30] audit: type=1400 audit(530.640:122): avc: denied { write } for pid=3690 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 540.381624][ T30] audit: type=1400 audit(539.790:123): avc: denied { write } for pid=3695 comm="syz.1.53" name="mcfilter6" dev="proc" ino=4026532764 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 549.891329][ T30] audit: type=1400 audit(549.300:124): avc: denied { create } for pid=3704 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 549.917396][ T30] audit: type=1400 audit(549.320:125): avc: denied { ioctl } for pid=3704 comm="syz.0.56" path="socket:[5248]" dev="sockfs" ino=5248 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 551.020969][ T30] audit: type=1400 audit(550.430:126): avc: denied { read write } for pid=3708 comm="syz.0.57" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 551.025608][ T30] audit: type=1400 audit(550.430:127): avc: denied { open } for pid=3708 comm="syz.0.57" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 551.061545][ T30] audit: type=1400 audit(550.470:128): avc: denied { ioctl } for pid=3708 comm="syz.0.57" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 551.941613][ T30] audit: type=1400 audit(551.350:129): avc: denied { allowed } for pid=3711 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 552.005916][ T30] audit: type=1400 audit(551.410:130): avc: denied { create } for pid=3711 comm="syz.0.58" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 552.048035][ T30] audit: type=1400 audit(551.450:131): avc: denied { map } for pid=3711 comm="syz.0.58" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5258 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 552.053045][ T30] audit: type=1400 audit(551.460:132): avc: denied { read write } for pid=3711 comm="syz.0.58" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5258 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 574.707297][ T30] audit: type=1400 audit(574.110:133): avc: denied { mount } for pid=3730 comm="syz.1.63" name="/" dev="autofs" ino=4318 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 574.732052][ T30] audit: type=1400 audit(574.140:134): avc: denied { read } for pid=3730 comm="syz.1.63" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 574.739653][ T30] audit: type=1400 audit(574.140:135): avc: denied { open } for pid=3730 comm="syz.1.63" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 574.832337][ T30] audit: type=1400 audit(574.230:136): avc: denied { ioctl } for pid=3730 comm="syz.1.63" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9379 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 574.982859][ T30] audit: type=1400 audit(574.360:137): avc: denied { unmount } for pid=3330 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 576.299770][ T30] audit: type=1400 audit(575.700:138): avc: denied { read write } for pid=3734 comm="syz.1.64" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.305343][ T30] audit: type=1400 audit(575.700:139): avc: denied { open } for pid=3734 comm="syz.1.64" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.334831][ T30] audit: type=1400 audit(575.740:140): avc: denied { ioctl } for pid=3734 comm="syz.1.64" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.401449][ T3737] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 576.438221][ T3737] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 594.174089][ C0] hrtimer: interrupt took 1431328 ns [ 595.481376][ T30] audit: type=1400 audit(594.880:141): avc: denied { ioctl } for pid=3762 comm="syz.0.74" path="socket:[4365]" dev="sockfs" ino=4365 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 614.760874][ T30] audit: type=1400 audit(614.160:142): avc: denied { read write } for pid=3773 comm="syz.0.76" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 614.776764][ T30] audit: type=1400 audit(614.180:143): avc: denied { open } for pid=3773 comm="syz.0.76" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 614.825383][ T30] audit: type=1400 audit(614.230:144): avc: denied { mounton } for pid=3773 comm="syz.0.76" path="/42/file0" dev="tmpfs" ino=228 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 617.245979][ T30] audit: type=1400 audit(616.650:145): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 618.163571][ T3779] fuse: Unknown parameter 'use00000000000000000000' [ 625.486083][ T30] audit: type=1400 audit(624.890:146): avc: denied { block_suspend } for pid=3782 comm="syz.1.79" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 639.394448][ T30] audit: type=1400 audit(638.800:147): avc: denied { create } for pid=3795 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 645.124527][ T3804] fuse: Unknown parameter 'user_i00000000000000000000' [ 662.811754][ T3479] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 663.271568][ T3479] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 663.274172][ T3479] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 663.275600][ T3479] usb 1-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.00 [ 663.275936][ T3479] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 663.634281][ T3479] usb 1-1: config 0 descriptor?? [ 664.533941][ T3479] hid-generic 0003:0D8C:0022.0001: unknown main item tag 0x0 [ 664.537799][ T3479] hid-generic 0003:0D8C:0022.0001: unknown main item tag 0x0 [ 664.732055][ T3820] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 664.747960][ T3820] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 664.833065][ T3479] hid-generic 0003:0D8C:0022.0001: hidraw0: USB HID v0.00 Device [HID 0d8c:0022] on usb-dummy_hcd.0-1/input0 [ 665.132935][ T3479] usb 1-1: USB disconnect, device number 2 [ 666.014696][ T3826] fuse: Unknown parameter 'user_i00000000000000000000' [ 667.624011][ T3830] capability: warning: `syz.0.90' uses deprecated v2 capabilities in a way that may be insecure [ 669.877551][ T3832] fido_id[3832]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 679.757554][ T30] audit: type=1400 audit(679.160:148): avc: denied { create } for pid=3839 comm="syz.1.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 680.916420][ T30] audit: type=1400 audit(680.320:149): avc: denied { setopt } for pid=3839 comm="syz.1.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 734.759952][ T30] audit: type=1400 audit(734.160:150): avc: denied { getopt } for pid=3878 comm="syz.0.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 739.481354][ T3394] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 739.785285][ T3394] usb 1-1: config 0 has an invalid interface number: 255 but max is 0 [ 739.791918][ T3394] usb 1-1: config 0 has no interface number 0 [ 739.795394][ T3394] usb 1-1: config 0 interface 255 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 242 [ 739.999480][ T3394] usb 1-1: New USB device found, idVendor=10cf, idProduct=8065, bcdDevice=91.79 [ 740.009852][ T3394] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 740.011276][ T3394] usb 1-1: Product: syz [ 740.011562][ T3394] usb 1-1: Manufacturer: syz [ 740.011792][ T3394] usb 1-1: SerialNumber: syz [ 740.074399][ T3394] usb 1-1: config 0 descriptor?? [ 740.205332][ T3887] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 740.464357][ T3394] usb 1-1: USB disconnect, device number 3 [ 751.425601][ T3900] netlink: 128 bytes leftover after parsing attributes in process `syz.1.109'. [ 751.433380][ T3900] netlink: 8 bytes leftover after parsing attributes in process `syz.1.109'. [ 752.624483][ T3903] netlink: 16150 bytes leftover after parsing attributes in process `syz.1.110'. [ 770.965999][ T30] audit: type=1400 audit(770.370:151): avc: denied { bind } for pid=3915 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 776.842198][ T30] audit: type=1326 audit(776.240:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3925 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 776.851552][ T30] audit: type=1326 audit(776.250:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3925 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 776.874233][ T30] audit: type=1326 audit(776.280:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3925 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 776.887196][ T30] audit: type=1326 audit(776.280:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3925 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 776.897691][ T30] audit: type=1326 audit(776.280:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3925 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 776.903407][ T30] audit: type=1326 audit(776.290:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3925 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 776.926365][ T30] audit: type=1326 audit(776.290:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3925 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132360 code=0x7ffc0000 [ 776.934573][ T30] audit: type=1326 audit(776.280:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3925 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 776.943049][ T30] audit: type=1326 audit(776.310:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3925 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 776.947840][ T30] audit: type=1326 audit(776.310:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3925 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 781.232191][ T3936] netlink: 24 bytes leftover after parsing attributes in process `syz.1.121'. [ 790.762512][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 790.767790][ T30] audit: type=1400 audit(790.160:199): avc: denied { create } for pid=3949 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 790.787218][ T30] audit: type=1400 audit(790.190:200): avc: denied { write open } for pid=3949 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1391 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 790.844433][ T30] audit: type=1400 audit(790.240:201): avc: denied { append } for pid=3949 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1391 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 790.935155][ T30] audit: type=1400 audit(790.340:202): avc: denied { getattr } for pid=3949 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 791.596375][ T30] audit: type=1400 audit(791.000:203): avc: denied { read } for pid=3951 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 792.013254][ T30] audit: type=1400 audit(791.420:204): avc: denied { unlink } for pid=3952 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1391 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 797.094439][ T3960] Zero length message leads to an empty skb [ 802.371962][ T3964] could not allocate digest TFM handle sha512-ssse3 [ 813.570019][ T30] audit: type=1326 audit(812.970:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 813.575685][ T30] audit: type=1326 audit(812.980:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 813.600380][ T30] audit: type=1326 audit(813.000:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 813.623432][ T30] audit: type=1326 audit(813.030:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=372 compat=1 ip=0x132360 code=0x7ffc0000 [ 813.657198][ T30] audit: type=1326 audit(813.058:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 813.670110][ T30] audit: type=1326 audit(813.058:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 813.689731][ T30] audit: type=1326 audit(813.086:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 813.700426][ T30] audit: type=1326 audit(813.096:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3977 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=365 compat=1 ip=0x132360 code=0x7ffc0000 [ 816.083550][ T30] audit: type=1400 audit(815.322:213): avc: denied { create } for pid=3981 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 843.855694][ T4011] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 843.911921][ T4011] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 845.477216][ T30] audit: type=1400 audit(842.813:214): avc: denied { create } for pid=4015 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 853.741673][ T30] audit: type=1400 audit(850.558:215): avc: denied { setopt } for pid=4015 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 856.281674][ T4024] Failed to initialize the IGMP autojoin socket (err -2) [ 859.068553][ T30] audit: type=1400 audit(855.535:216): avc: denied { read } for pid=4029 comm="syz.0.151" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 859.072698][ T30] audit: type=1400 audit(855.535:217): avc: denied { open } for pid=4029 comm="syz.0.151" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 885.998473][ T30] audit: type=1400 audit(880.716:218): avc: denied { write } for pid=4049 comm="syz.0.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 901.289555][ T30] audit: type=1400 audit(895.027:219): avc: denied { setopt } for pid=4061 comm="syz.0.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 901.310781][ T30] audit: type=1400 audit(895.046:220): avc: denied { accept } for pid=4061 comm="syz.0.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 902.985815][ T4069] ------------[ cut here ]------------ [ 902.986313][ T4069] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000) [ 903.052341][ T4069] WARNING: kernel/bpf/verifier.c:2742 at reg_bounds_sanity_check+0x558/0x1804, CPU#0: syz.1.159/4069 [ 903.057233][ T4069] Modules linked in: [ 903.059241][ T4069] CPU: 0 UID: 0 PID: 4069 Comm: syz.1.159 Not tainted syzkaller #0 PREEMPT [ 903.059985][ T4069] Hardware name: linux,dummy-virt (DT) [ 903.060854][ T4069] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 903.061451][ T4069] pc : reg_bounds_sanity_check+0x558/0x1804 [ 903.061923][ T4069] lr : reg_bounds_sanity_check+0x558/0x1804 [ 903.062335][ T4069] sp : ffff8000a0d96fa0 [ 903.062765][ T4069] x29: ffff8000a0d96fd0 x28: 1fffe00004690250 x27: 1fffe00004690250 [ 903.063591][ T4069] x26: ffffffffffffdfcc x25: 00000000ffffdfcd x24: ffff8000856f7b20 [ 903.064426][ T4069] x23: 0000000000000004 x22: 0000000000000004 x21: ffff8000856f79c0 [ 903.065616][ T4069] x20: ffff0000178d0000 x19: ffff000023481230 x18: 0000000000000000 [ 903.066511][ T4069] x17: ffff7fffe2d41000 x16: ffff00006a02c504 x15: 0000000020012340 [ 903.067253][ T4069] x14: 0000000000001720 x13: 0000000000000000 x12: ffff7000141b2d69 [ 903.067932][ T4069] x11: 1ffff000141b2d68 x10: ffff7000141b2d68 x9 : dfff800000000000 [ 903.068860][ T4069] x8 : ffff8000a0d96b48 x7 : ffff8000a0d96c70 x6 : ffff8000a0d96bc0 [ 903.069668][ T4069] x5 : ffff8000a0d96ba8 x4 : 0000000000000000 x3 : 1fffe0000d407535 [ 903.070343][ T4069] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000155a5580 [ 903.071235][ T4069] Call trace: [ 903.071887][ T4069] reg_bounds_sanity_check+0x558/0x1804 (P) [ 903.072564][ T4069] reg_set_min_max+0x14c/0x210 [ 903.072965][ T4069] check_cond_jmp_op+0x189c/0x5978 [ 903.073366][ T4069] do_check_common+0x8244/0x9578 [ 903.073749][ T4069] bpf_check+0x5910/0x89b4 [ 903.074108][ T4069] bpf_prog_load+0x1010/0x1f24 [ 903.074466][ T4069] __sys_bpf+0x808/0x2988 [ 903.074851][ T4069] __arm64_sys_bpf+0x70/0xa4 [ 903.075241][ T4069] invoke_syscall+0x6c/0x258 [ 903.075602][ T4069] el0_svc_common.constprop.0+0xac/0x230 [ 903.076771][ T4069] do_el0_svc_compat+0x40/0x68 [ 903.077328][ T4069] el0_svc_compat+0x50/0x278 [ 903.077812][ T4069] el0t_32_sync_handler+0x88/0xac [ 903.078373][ T4069] el0t_32_sync+0x19c/0x1a0 [ 903.079084][ T4069] irq event stamp: 2882 [ 903.079442][ T4069] hardirqs last enabled at (2881): [] finish_task_switch.isra.0+0x15c/0x690 [ 903.080244][ T4069] hardirqs last disabled at (2882): [] el1_brk64+0x20/0x54 [ 903.081024][ T4069] softirqs last enabled at (2786): [] handle_softirqs+0x88c/0xdb4 [ 903.082157][ T4069] softirqs last disabled at (2771): [] __do_softirq+0x14/0x20 [ 903.083076][ T4069] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 905.421498][ T3631] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 905.821423][ T3631] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 906.117912][ T3631] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 906.395834][ T3631] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 908.033168][ T30] audit: type=1400 audit(901.332:221): avc: denied { read } for pid=3169 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 910.824580][ T3631] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 910.927414][ T3631] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 911.016036][ T3631] bond0 (unregistering): Released all slaves [ 911.700602][ T3631] hsr_slave_0: left promiscuous mode [ 911.750376][ T3631] hsr_slave_1: left promiscuous mode [ 912.107120][ T3631] veth1_macvtap: left promiscuous mode [ 912.128178][ T3631] veth0_macvtap: left promiscuous mode [ 912.156616][ T3631] veth1_vlan: left promiscuous mode [ 912.177179][ T3631] veth0_vlan: left promiscuous mode [ 923.085812][ T3631] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 923.501953][ T3631] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 924.187972][ T3631] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 924.772952][ T3631] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 928.600078][ T3631] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 928.684420][ T3631] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 928.739285][ T3631] bond0 (unregistering): Released all slaves [ 929.070259][ T3631] hsr_slave_0: left promiscuous mode [ 929.089972][ T3631] hsr_slave_1: left promiscuous mode [ 929.155179][ T3631] veth1_macvtap: left promiscuous mode [ 929.157425][ T3631] veth0_macvtap: left promiscuous mode [ 929.159098][ T3631] veth1_vlan: left promiscuous mode [ 929.160410][ T3631] veth0_vlan: left promiscuous mode