last executing test programs: 2h3m10.644600587s ago: executing program 0 (id=383): mkdir(&(0x7f0000000080)='./file0\x00', 0x1ba) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2a05004, 0x0) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x2981026, 0x0) 2h3m8.494518307s ago: executing program 0 (id=384): mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001180), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000004280)={0x2020, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(r0, &(0x7f00000062c0)="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", 0x2000, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x10, 0xffffffffffffffda, 0x3ff, {0x0, 0xb}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, r1, {0x7, 0x2b, 0xffffffde, 0x3000400c, 0x0, 0xfffe, 0x2, 0xfffffffe, 0x0, 0x0, 0x100, 0x100}}, 0x50) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) close(0x3) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) pselect6(0x40, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x1, 0x800, 0x8}, 0x0, &(0x7f00000000c0)={0x1f, 0x3}, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) 2h3m3.324729724s ago: executing program 0 (id=385): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)={{0x14}, [@NFT_MSG_DELSET={0x14, 0xb, 0xa, 0x101, 0x0, 0x0, {0xa}}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x3c}}, 0x20008844) 2h3m2.055392819s ago: executing program 0 (id=386): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ff9}]}) statx(0xffffffffffffffff, 0x0, 0x1000, 0x40, 0x0) 2h3m0.374777925s ago: executing program 0 (id=388): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newspdinfo={0x1c, 0x24, 0x1, 0x1, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}}, 0x8004) 2h2m48.173848697s ago: executing program 0 (id=391): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0x20, 0xffffffff}, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=@newsa={0xf0, 0x10, 0x1, 0xfffffffe, 0x100, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x714, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@loopback, 0x4d4, 0x6c}, @in=@loopback, {0x0, 0x192, 0x6, 0xffff, 0x8251c, 0x2, 0xfffffffffffffff8}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0x2, 0xfffffffc}, 0x70bd2a, 0x3505, 0x2, 0x1, 0x0, 0x20}}, 0xf0}, 0x1, 0x0, 0x0, 0x8801}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000001380)='ns/cgroup\x00') open_by_handle_at(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000f10000000bfc00000002000000000040"], 0x0) ptrace$cont(0x1f, 0x0, 0x100, 0x4) sendmsg$nl_xfrm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) socket(0x10, 0x803, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f00000000c0)=0xa, 0x4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'xfrm0\x00', 0x0}) sendto$packet(r5, &(0x7f0000000180)="10031400e0ff020002004788aa96a13bb100001100007fca1a00", 0x1000a, 0x0, &(0x7f0000000140)={0x11, 0x0, r6}, 0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x17, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) sendmsg$nl_route(r7, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 2h2m2.425521998s ago: executing program 32 (id=391): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0x20, 0xffffffff}, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=@newsa={0xf0, 0x10, 0x1, 0xfffffffe, 0x100, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x714, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@loopback, 0x4d4, 0x6c}, @in=@loopback, {0x0, 0x192, 0x6, 0xffff, 0x8251c, 0x2, 0xfffffffffffffff8}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0x2, 0xfffffffc}, 0x70bd2a, 0x3505, 0x2, 0x1, 0x0, 0x20}}, 0xf0}, 0x1, 0x0, 0x0, 0x8801}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000001380)='ns/cgroup\x00') open_by_handle_at(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000f10000000bfc00000002000000000040"], 0x0) ptrace$cont(0x1f, 0x0, 0x100, 0x4) sendmsg$nl_xfrm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) socket(0x10, 0x803, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f00000000c0)=0xa, 0x4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'xfrm0\x00', 0x0}) sendto$packet(r5, &(0x7f0000000180)="10031400e0ff020002004788aa96a13bb100001100007fca1a00", 0x1000a, 0x0, &(0x7f0000000140)={0x11, 0x0, r6}, 0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x17, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) sendmsg$nl_route(r7, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 2h1m50.323496193s ago: executing program 2 (id=408): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) openat$cgroup_root(0xffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) 2h1m50.137129777s ago: executing program 2 (id=409): capset(0x0, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000001340)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "122d92", 0x28, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @remote, @loopback}}}}}}, 0x0) 2h1m50.066011682s ago: executing program 2 (id=410): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000900)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_MPATH(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x28, r0, 0x1, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 2h1m49.405424881s ago: executing program 2 (id=411): munmap(&(0x7f0000001000/0x4000)=nil, 0x4000) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000000)='tmpfs\x00', 0x2, &(0x7f0000000300)='usrquota') 2h1m49.203442766s ago: executing program 2 (id=412): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000008c0)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@bridge_newneigh={0x1c, 0x1c, 0x1, 0x70bd29, 0x25dfdbfe, {0x7, 0x0, 0x0, r1, 0x80, 0x7e, 0x1}}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4040000) 2h1m48.766344539s ago: executing program 2 (id=413): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400"], 0x7c}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000), 0x20000328) 2h1m2.330648701s ago: executing program 33 (id=413): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400"], 0x7c}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000), 0x20000328) 1h54m30.892842148s ago: executing program 1 (id=863): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) syz_emit_ethernet(0xaf, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa8100000086dd60f7d8ff00753c0020010000000000000000000000000000ff0200000000000000000000000000010004"], 0x0) 1h54m25.646094139s ago: executing program 1 (id=865): syz_open_dev$evdev(&(0x7f0000000000), 0x1, 0x2002) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {0x4, 0x0, 0x5374}, 0x1d, [0x8000, 0x78, 0xf, 0x2, 0x80, 0x2, 0x203, 0x7e, 0x4, 0x4b, 0x39cc1919, 0x42, 0x9, 0x5, 0xffff2d37, 0x881, 0x6, 0x3, 0x0, 0x5, 0x4, 0x3, 0x5, 0x3c5d, 0x1, 0x0, 0x9, 0x2, 0x15bb, 0x2, 0xe65f, 0x3, 0x7, 0x3, 0x7fff, 0x7, 0x80000000, 0xa72, 0x3, 0x7, 0x0, 0x71, 0xe, 0x5, 0x1, 0x5, 0x9, 0x3a, 0xffffff7f, 0x6, 0x6, 0xfffbffff, 0x5, 0x4, 0x8, 0x0, 0x80, 0x2, 0x4, 0x9, 0x8, 0x7, 0x1f, 0x40], [0x10000007, 0x3, 0x800, 0x8000, 0x10, 0xffeffff3, 0x8, 0x200c7, 0xf7, 0x10, 0x2bf, 0x6c9, 0xfff, 0xfffffffc, 0x5, 0x0, 0xd14, 0x5, 0x2f, 0xe, 0x4312, 0x7c, 0xea4, 0x0, 0x4, 0x22, 0x1, 0x40009, 0x400, 0x401, 0x6, 0x1, 0xff, 0x5, 0x5, 0x5f31, 0x7f9, 0x5, 0x2, 0x2, 0x9, 0x5, 0x9, 0x8, 0x800000d, 0x88da, 0x2007, 0xd, 0x1, 0xfe000000, 0x10002, 0x2, 0x7b, 0x9, 0x3, 0x3, 0x8, 0x1, 0x7, 0x3, 0x9, 0x48c93690, 0x1000042, 0xffff], [0x7, 0xf5fd, 0x0, 0x5, 0x1, 0x100, 0xa, 0x9, 0x800003, 0x7fff, 0x0, 0x5, 0xf, 0x4, 0x5, 0x20000005, 0x0, 0x1ef, 0x4, 0x8, 0x86, 0x3, 0x0, 0x3e7, 0xa, 0x5, 0x200, 0x5, 0x3, 0x8, 0x8, 0x6cfc, 0x5, 0x39, 0x7, 0x200, 0x80000000, 0x3, 0x4e0a, 0x7, 0x1000, 0xa2, 0x7, 0x5, 0x3, 0x6, 0xac8, 0xffffffff, 0x2, 0x11, 0x7ff, 0xfffffff9, 0x0, 0x10000, 0xffff, 0x2b98, 0x1, 0x4, 0x120000, 0xbe, 0x0, 0xa2ed, 0x2, 0x25], [0x9, 0xbb31, 0x7, 0xb, 0x5, 0x3, 0xa, 0x80000006, 0x0, 0x5, 0x7d, 0xc9, 0x6, 0x6, 0x8, 0x57b, 0x7, 0x10000, 0x6, 0x7ffd, 0xfffd, 0x4, 0x20002, 0x5, 0xe8a0556, 0x2, 0x14c, 0x3, 0x6, 0x6, 0x3, 0x80000000, 0x5, 0x8, 0xce, 0xee1, 0xfffff000, 0x179, 0x3, 0x7e, 0x100, 0x9600, 0x56e, 0x2, 0x1007, 0x40000006, 0x1, 0x0, 0x8, 0x4, 0x30b1d693, 0xa1f, 0xc, 0x800007, 0xfffffffe, 0x3, 0x0, 0xffff, 0x8000007, 0x2bf, 0x3, 0x200, 0x7fffffff, 0x2]}, 0x45c) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="7000000010000304000080000000000000007400", @ANYRES32=r2, @ANYBLOB="0000000003120100500012800b000100627269646765000040000280080005000100000006002700000000000800010015000800050025000000000008000400000000000c002e"], 0x70}, 0x1, 0x0, 0x0, 0x800}, 0x40) 1h54m22.804277689s ago: executing program 1 (id=885): openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f, 0xe0000000, 0x564b043a, 0x83, 0xffff, 0x5, 0x2, 0x0, 0x0, 0x80, 0x80000001}}, 0x50) syz_fuse_handle_req(r0, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d838aae8c05dd22d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20c01, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000003c0)='n', 0xfdef}], 0x1) 1h54m1.525047182s ago: executing program 1 (id=904): mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x2151090, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x1) 1h53m58.215005123s ago: executing program 1 (id=906): r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000200), 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x90}, 0x1c) 1h53m57.35497941s ago: executing program 1 (id=907): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x30, r1, 0x21, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_FRAME_COUNTER={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 1h53m57.35479478s ago: executing program 34 (id=907): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x30, r1, 0x21, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_FRAME_COUNTER={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 1h51m5.583945885s ago: executing program 3 (id=1358): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000340)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x1c, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x20000040) 1h51m5.136112095s ago: executing program 3 (id=1360): r0 = syz_usb_connect(0x2, 0x2d, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000459bb2405804035000000000000109021b000111000000090400000195699b000905", @ANYRES32], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$sierra_net(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, &(0x7f0000000340)={0x1c, &(0x7f0000000200)={0x40, 0xc4acde141ca2cafa, 0x3, "4c93c4"}, 0x0, 0x0}) syz_usb_control_io$lan78xx(r0, 0x0, 0x0) syz_usb_control_io$rtl8150(r0, 0x0, &(0x7f00000003c0)={0x2c, &(0x7f0000000240)={0x0, 0xc, 0x5, "09b4fb03ef"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$lan78xx(r0, 0x0, &(0x7f0000000680)={0x34, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\r#'], 0x0, 0x0, 0x0, 0x0, 0x0}) 1h51m4.974144226s ago: executing program 3 (id=1361): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x3c, r1, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) 1h51m4.804745757s ago: executing program 3 (id=1362): mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x2151090, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x1b101a, 0x0) mount$bind(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2301091, 0x0) umount2(&(0x7f0000000140)='./file0/../file0\x00', 0x8) 1h51m4.631837669s ago: executing program 3 (id=1363): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f0000002b80)={0x0, 0x0, &(0x7f0000002b40)={&(0x7f0000002980)={0x20, 0x1, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40080}, 0x40010) 1h51m4.095510315s ago: executing program 3 (id=1364): r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x42000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) 1h51m4.095356785s ago: executing program 35 (id=1364): r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x42000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) 42m7.041701844s ago: executing program 5 (id=4668): mknodat$null(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x8000, 0x103) mount$cgroup(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x0, &(0x7f0000000040)={[{@name={'name', 0x3d, 'user_-'}}]}) 41m55.113689047s ago: executing program 5 (id=4676): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x100005, 0x5, 0x5, 0x1}, 0x50) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, 0x0}, 0x20) 41m37.043441058s ago: executing program 5 (id=4689): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000780)={'filter\x00', 0x7, 0x4, 0x3f0, 0x220, 0x0, 0x220, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@arp={@local, @local, 0x0, 0xffffff00, 0xd, 0xf, {@mac=@dev={'\xaa\xaa\xaa\xaa\xaa', 0x36}, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}}, {@empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}}, 0x7, 0x7fff, 0x5, 0x1, 0xf, 0x7, 'ipvlan1\x00', 'bridge_slave_0\x00', {0xff}, {}, 0x0, 0x2a2}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast2, @empty, 0x2}}}, {{@arp={@initdev={0xac, 0x1e, 0x1, 0x0}, @local, 0x0, 0xffffff00, 0x5, 0x3, {@mac=@local, {[0x0, 0xff, 0xff]}}, {@mac=@random="294b3b283517", {[0xff, 0x0, 0xff, 0x0, 0xdba9beff375cd864]}}, 0x4, 0x8, 0x1, 0x8, 0x7, 0xfff, 'veth1_to_team\x00', 'ip6erspan0\x00', {0xff}, {}, 0x0, 0x10}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @loopback, @private=0xa010100, 0x4, 0x1}}}, {{@arp={@empty, @multicast2, 0x0, 0xffffffff, 0x9, 0x4, {@empty, {[0xff, 0x0, 0x0, 0x0, 0xff, 0xff]}}, {@mac, {[0x0, 0xff, 0x0, 0xff, 0xff]}}, 0x5, 0x30, 0x9, 0xc, 0x8b, 0x6, 'pim6reg1\x00', 'wg0\x00', {}, {0xff}}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) 41m25.054570274s ago: executing program 5 (id=4704): r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000003e40), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000004440)={0x0, 0x0, &(0x7f0000004400)={&(0x7f0000004380)={0x30, r0, 0x20d, 0x70bd2b, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}]}, 0x30}}, 0x4010) 41m8.017223256s ago: executing program 5 (id=4720): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000040), 0x10) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000080)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)="751edb18dbf46e8f09d97e5bbd402d11fea33f21e2", 0x15}, {&(0x7f00000001c0)="f1", 0x1}, {&(0x7f0000000240)="6d5f67af894fc09d550067b675507cd5556770418b1b34525a6becaa1a13b103508a04d5cd215b761cd584cddde2539d4d275745d349805bf16f7bd8010d7104086c0e743d76d4de754ad1714e562adea566098cbd4bb4b351de0ed58f1361f6920b4598be11b9f546e6ba23ba5075072ef9d7362c255f7797866066f2697c324aa5dc055389df4d7725ef8f4e391c9bcbc80b7a9397f3f484ddc09076e854b1ee0569277a48abb91df8c3d57555dd4ed07a395e7c78444c971401bb04a219d661d01158a497c68330c7a8878ad272b2fd9915717c58efd568017a16947f3145cc2d", 0xe2}], 0x3}, 0x0) 41m2.517615582s ago: executing program 5 (id=4722): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x474c, 0x4) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e20, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x300) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f00000004c0)=0xff8, 0x4) recvmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)}, 0x3}], 0x1, 0x45833af92e4b39ff, 0x0) 40m17.464356217s ago: executing program 36 (id=4722): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x474c, 0x4) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e20, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x300) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f00000004c0)=0xff8, 0x4) recvmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)}, 0x3}], 0x1, 0x45833af92e4b39ff, 0x0) 10.57410523s ago: executing program 6 (id=7785): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x40200, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x3ff) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000740)={0x6e, 0x483aa015, 0x0, 0x0, 0x0, "fe00"}) 10.079966983s ago: executing program 6 (id=7787): r0 = socket$inet_udp(0x2, 0x2, 0x0) setresuid(0x0, 0xee00, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3d, &(0x7f0000000080), 0x8) 9.714925567s ago: executing program 6 (id=7788): r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000001400), 0x101) r1 = syz_io_uring_setup(0x1327, &(0x7f0000000300)={0x0, 0x7303, 0x10100, 0x0, 0x2}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0}) io_uring_enter(r1, 0x2def, 0x4000, 0x0, 0x0, 0x0) exit(0x5) write$P9_RGETLOCK(r0, 0x0, 0x0) 6.926664691s ago: executing program 6 (id=7792): r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000600000/0x4000)=nil, 0x4000, 0xa, 0x401d031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x801) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x104, &(0x7f0000000080)=0x80000001, 0x0, 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f000068c000/0xc000)=nil, &(0x7f0000817000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="16"], 0x50) io_uring_enter(r2, 0x2219, 0x7721, 0x16, 0x0, 0x0) 6.323135491s ago: executing program 4 (id=7794): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r1, 0x4734}}, 0x10) close_range(r0, r0, 0x0) 5.843726203s ago: executing program 4 (id=7795): r0 = socket$igmp(0x2, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000009, 0x12, r1, 0x0) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f0000000040)={@remote, @multicast2, 0x1, "0596232642d17c7dc02cd9f90c8dd705b8dd6dadcd9a1c8ddffa4da80fbf040d", 0x7c, 0x8, 0x100, 0x3}, 0x3c) 5.107675962s ago: executing program 4 (id=7796): madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) 4.586941507s ago: executing program 4 (id=7797): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000feffffff0000000000000000850000002800000018010000646c6c2500000000002020207b1af8ff00000000bfa10000000000000701000001ffffffb702000008000000b7030000feffffff850000009b00000095"], &(0x7f00000000c0)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xffffffffffffff6c, 0x0, &(0x7f0000000100)="e0bb547ed3f7ffe9abc89b6f0458", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 3.977165767s ago: executing program 6 (id=7798): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)={0x38, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0x8}, [@CTA_EXPECT_ID={0x8}, @CTA_EXPECT_NAT={0x1c, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000070}, 0x4) 3.838715876s ago: executing program 4 (id=7799): r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@private, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x6c}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x4}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 2.958081794s ago: executing program 6 (id=7800): r0 = syz_open_procfs(0x0, &(0x7f0000000480)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = syz_clone(0xa0700000, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000340)='numa_maps\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) pread64(r2, &(0x7f0000000100)=""/13, 0xd, 0x9) 0s ago: executing program 4 (id=7801): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x4f29, 0x5, 0x3, 0x4, 0x1, 0x3, 0x12, 0x11, 0x81, 0xfffffffc, 0x2, 0xfffffffe, 0x1, 0x1, 0x2, 0x101, 0x8, 0x400009, 0x3, 0x5, 0x99, 0xcaa7, 0x80, 0x204, 0x7, 0x2000e67, 0x3c, 0x8, 0xfffffffe, 0x0, 0xfffffff4]}) kernel console output (not intermixed with test programs): e } for pid=22640 comm="syz.6.7506" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7646.658821][ T29] audit: type=1400 audit(7902.551:73094): avc: denied { read write open } for pid=22640 comm="syz.6.7506" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7646.678519][ T29] audit: type=1400 audit(7902.571:73095): avc: denied { setattr } for pid=22640 comm="syz.6.7506" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7646.687350][ T29] audit: type=1400 audit(7902.581:73096): avc: denied { create } for pid=22640 comm="syz.6.7506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7646.700100][ T29] audit: type=1400 audit(7902.591:73097): avc: denied { create } for pid=22640 comm="syz.6.7506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7646.715528][ T29] audit: type=1400 audit(7902.611:73098): avc: denied { create } for pid=22640 comm="syz.6.7506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7646.725346][ T29] audit: type=1400 audit(7902.611:73099): avc: denied { write } for pid=22640 comm="syz.6.7506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7646.730041][ T29] audit: type=1400 audit(7902.621:73100): avc: denied { read } for pid=22640 comm="syz.6.7506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7646.737496][ T29] audit: type=1400 audit(7902.631:73101): avc: denied { read } for pid=22640 comm="syz.6.7506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7646.787149][ T29] audit: type=1400 audit(7902.681:73102): avc: denied { prog_load } for pid=22640 comm="syz.6.7506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7651.660702][ T29] kauditd_printk_skb: 269 callbacks suppressed [ 7651.665243][ T29] audit: type=1400 audit(7907.551:73372): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7651.666586][ T29] audit: type=1400 audit(7907.551:73373): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7651.667820][ T29] audit: type=1400 audit(7907.561:73374): avc: denied { setattr } for pid=22674 comm="syz.6.7523" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7651.674542][ T29] audit: type=1400 audit(7907.571:73375): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7651.685987][ T29] audit: type=1400 audit(7907.581:73376): avc: denied { ioctl } for pid=22674 comm="syz.6.7523" path="/dev/dlm_plock" dev="devtmpfs" ino=87 ioctlcmd=0x5407 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7651.699577][ T29] audit: type=1400 audit(7907.591:73377): avc: denied { ioctl } for pid=22674 comm="syz.6.7523" path="/dev/dlm_plock" dev="devtmpfs" ino=87 ioctlcmd=0x5513 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7651.723989][ T29] audit: type=1400 audit(7907.621:73378): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7651.725977][ T29] audit: type=1400 audit(7907.621:73379): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7651.766943][ T29] audit: type=1400 audit(7907.661:73380): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7651.769088][ T29] audit: type=1400 audit(7907.661:73381): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7651.998492][T22677] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7651.999605][T22677] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7656.675287][ T29] kauditd_printk_skb: 135 callbacks suppressed [ 7656.676499][ T29] audit: type=1400 audit(7912.571:73517): avc: denied { recv } for pid=16064 comm="kworker/u8:2" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7656.698559][ T29] audit: type=1400 audit(7912.571:73518): avc: denied { recv } for pid=16064 comm="kworker/u8:2" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7656.699119][ T29] audit: type=1400 audit(7912.581:73519): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7656.699223][ T29] audit: type=1400 audit(7912.591:73520): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7656.968904][ T29] audit: type=1400 audit(7912.861:73521): avc: denied { create } for pid=22703 comm="syz.4.7536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 7657.007272][ T29] audit: type=1400 audit(7912.901:73522): avc: denied { ioctl } for pid=22703 comm="syz.4.7536" path="socket:[83807]" dev="sockfs" ino=83807 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 7657.049566][ T29] audit: type=1400 audit(7912.941:73523): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7657.087619][ T29] audit: type=1400 audit(7912.981:73524): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7657.108431][ T29] audit: type=1400 audit(7912.991:73525): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7657.127547][ T29] audit: type=1400 audit(7913.001:73526): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7661.688705][ T29] kauditd_printk_skb: 153 callbacks suppressed [ 7661.691017][ T29] audit: type=1400 audit(7917.581:73680): avc: denied { getopt } for pid=22731 comm="syz.4.7549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 7661.741711][ T29] audit: type=1400 audit(7917.631:73681): avc: denied { read } for pid=22731 comm="syz.4.7549" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7661.749982][ T29] audit: type=1400 audit(7917.641:73682): avc: denied { read open } for pid=22731 comm="syz.4.7549" path="/dev/ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7661.793897][ T29] audit: type=1400 audit(7917.691:73683): avc: denied { ioctl } for pid=22731 comm="syz.4.7549" path="/dev/ttynull" dev="devtmpfs" ino=609 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7661.799220][ T29] audit: type=1400 audit(7917.691:73684): avc: denied { read } for pid=22731 comm="syz.4.7549" name="pcmC0D0p" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7661.808615][ T29] audit: type=1400 audit(7917.701:73685): avc: denied { read open } for pid=22731 comm="syz.4.7549" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7661.847874][ T29] audit: type=1400 audit(7917.741:73686): avc: denied { ioctl } for pid=22731 comm="syz.4.7549" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=725 ioctlcmd=0x4153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7661.877348][T22732] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=22732 comm=syz.4.7549 [ 7661.907209][ T29] audit: type=1400 audit(7917.801:73687): avc: denied { ioctl } for pid=22731 comm="syz.4.7549" path="socket:[84686]" dev="sockfs" ino=84686 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 7661.932954][T22732] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22732 comm=syz.4.7549 [ 7662.032913][ T29] audit: type=1400 audit(7917.921:73688): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7662.070732][ T29] audit: type=1400 audit(7917.961:73689): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7665.691247][T22757] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7665.694785][T22757] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7666.794128][ T29] kauditd_printk_skb: 197 callbacks suppressed [ 7666.801337][ T29] audit: type=1400 audit(7922.691:73887): avc: denied { read } for pid=22762 comm="syz.6.7562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7666.806849][ T29] audit: type=1400 audit(7922.701:73888): avc: denied { write } for pid=22762 comm="syz.6.7562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7666.814608][ T29] audit: type=1400 audit(7922.711:73889): avc: denied { create } for pid=22762 comm="syz.6.7562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7666.816775][ T29] audit: type=1400 audit(7922.711:73890): avc: denied { write } for pid=22762 comm="syz.6.7562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7666.823751][ T29] audit: type=1400 audit(7922.711:73891): avc: denied { read } for pid=22762 comm="syz.6.7562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7666.825081][ T29] audit: type=1400 audit(7922.711:73892): avc: denied { read } for pid=22762 comm="syz.6.7562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7666.831484][ T29] audit: type=1400 audit(7922.721:73893): avc: denied { write } for pid=22762 comm="syz.6.7562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7666.851836][ T29] audit: type=1400 audit(7922.741:73894): avc: denied { ioctl } for pid=22762 comm="syz.6.7562" path="socket:[84716]" dev="sockfs" ino=84716 ioctlcmd=0x8936 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 7666.860784][ T29] audit: type=1400 audit(7922.751:73895): avc: denied { ioctl } for pid=22762 comm="syz.6.7562" path="socket:[84715]" dev="sockfs" ino=84715 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7666.865433][ T29] audit: type=1400 audit(7922.761:73896): avc: denied { module_request } for pid=22762 comm="syz.6.7562" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7669.165993][T22780] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7669.167062][T22780] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7669.650706][T22784] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7669.656407][T22784] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7670.889042][T22792] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7670.905889][T22792] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7671.814862][ T29] kauditd_printk_skb: 210 callbacks suppressed [ 7671.819404][ T29] audit: type=1400 audit(7927.701:74107): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7671.820773][ T29] audit: type=1400 audit(7927.711:74108): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7671.827983][ T29] audit: type=1400 audit(7927.721:74109): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7671.847865][ T29] audit: type=1400 audit(7927.731:74110): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7671.849978][ T29] audit: type=1400 audit(7927.741:74111): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7671.869537][ T29] audit: type=1400 audit(7927.761:74112): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7671.873965][ T29] audit: type=1400 audit(7927.771:74113): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7671.885554][ T29] audit: type=1400 audit(7927.781:74114): avc: denied { create } for pid=22808 comm="syz.4.7576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7671.904644][ T29] audit: type=1400 audit(7927.801:74115): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7671.908729][ T29] audit: type=1400 audit(7927.801:74116): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7676.890573][ T29] kauditd_printk_skb: 95 callbacks suppressed [ 7676.891942][ T29] audit: type=1400 audit(7932.771:74212): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7676.894162][ T29] audit: type=1400 audit(7932.771:74213): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7676.896906][ T29] audit: type=1400 audit(7932.781:74214): avc: denied { recv } for pid=21133 comm="syz.4.7119" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7676.918361][ T29] audit: type=1400 audit(7932.811:74215): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7676.920852][ T29] audit: type=1400 audit(7932.811:74216): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7676.934388][ T29] audit: type=1400 audit(7932.831:74217): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7676.937482][ T29] audit: type=1400 audit(7932.831:74218): avc: denied { recv } for pid=15 comm="rcu_preempt" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7676.964781][ T29] audit: type=1400 audit(7932.861:74219): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7676.967674][ T29] audit: type=1400 audit(7932.861:74220): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7677.153909][ T29] audit: type=1400 audit(7933.051:74221): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7681.894588][ T29] kauditd_printk_skb: 173 callbacks suppressed [ 7681.895470][ T29] audit: type=1400 audit(7937.791:74395): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7681.898767][ T29] audit: type=1400 audit(7937.791:74396): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7681.924242][ T29] audit: type=1400 audit(7937.811:74397): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7681.927767][ T29] audit: type=1400 audit(7937.821:74398): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7681.992528][ T29] audit: type=1400 audit(7937.881:74399): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7681.996848][ T29] audit: type=1400 audit(7937.891:74400): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7682.043021][ T29] audit: type=1400 audit(7937.931:74401): avc: denied { read write } for pid=22869 comm="syz.6.7601" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7682.048322][ T29] audit: type=1400 audit(7937.941:74402): avc: denied { read write open } for pid=22869 comm="syz.6.7601" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7682.055295][ T29] audit: type=1400 audit(7937.951:74403): avc: denied { ioctl } for pid=22869 comm="syz.6.7601" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0xaf13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7682.059528][ T29] audit: type=1400 audit(7937.951:74404): avc: denied { create } for pid=22869 comm="syz.6.7601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7686.924556][ T29] kauditd_printk_skb: 148 callbacks suppressed [ 7686.928161][ T29] audit: type=1400 audit(7942.821:74553): avc: denied { create } for pid=22893 comm="syz.4.7611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7686.960141][ T29] audit: type=1400 audit(7942.851:74554): avc: denied { write } for pid=22893 comm="syz.4.7611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7686.987699][ T29] audit: type=1400 audit(7942.881:74555): avc: denied { read } for pid=22893 comm="syz.4.7611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7686.990488][ T29] audit: type=1400 audit(7942.881:74556): avc: denied { read } for pid=22893 comm="syz.4.7611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7687.020590][ T29] audit: type=1400 audit(7942.911:74557): avc: denied { write } for pid=22893 comm="syz.4.7611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7687.191539][ T29] audit: type=1400 audit(7943.081:74558): avc: denied { read } for pid=22900 comm="syz.6.7612" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7687.194637][ T29] audit: type=1400 audit(7943.081:74559): avc: denied { read open } for pid=22900 comm="syz.6.7612" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7687.209531][ T29] audit: type=1400 audit(7943.101:74560): avc: denied { read } for pid=22900 comm="syz.6.7612" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7687.235873][ T29] audit: type=1400 audit(7943.131:74561): avc: denied { read open } for pid=22900 comm="syz.6.7612" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7687.241352][ T29] audit: type=1400 audit(7943.131:74562): avc: denied { ioctl } for pid=22900 comm="syz.6.7612" path="/dev/mixer" dev="devtmpfs" ino=730 ioctlcmd=0x5303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7687.553813][T22903] random: crng reseeded on system resumption [ 7691.956065][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 7691.960429][ T29] audit: type=1400 audit(7947.851:74616): avc: denied { write } for pid=22915 comm="syz.6.7614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7692.420630][ T29] audit: type=1400 audit(7948.311:74617): avc: denied { create } for pid=22917 comm="syz.4.7615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7692.433872][ T29] audit: type=1400 audit(7948.321:74618): avc: denied { write } for pid=22917 comm="syz.4.7615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7692.456346][ T29] audit: type=1400 audit(7948.351:74619): avc: denied { module_request } for pid=22917 comm="syz.4.7615" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7693.081538][ T29] audit: type=1400 audit(7948.941:74620): avc: denied { create } for pid=22917 comm="syz.4.7615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7693.084297][ T29] audit: type=1400 audit(7948.961:74621): avc: denied { ioctl } for pid=22917 comm="syz.4.7615" path="socket:[84930]" dev="sockfs" ino=84930 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7693.084412][ T29] audit: type=1400 audit(7948.971:74622): avc: denied { setattr } for pid=22917 comm="syz.4.7615" name="KCM" dev="sockfs" ino=84931 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 7693.417521][ T29] audit: type=1400 audit(7949.311:74623): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7693.421991][ T29] audit: type=1400 audit(7949.311:74624): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7693.443295][ T29] audit: type=1400 audit(7949.331:74625): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7695.883802][T22941] nbd6: detected capacity change from 0 to 63 [ 7695.923544][T22941] block nbd6: NBD_DISCONNECT [ 7695.925198][T22941] block nbd6: Disconnected due to user request. [ 7695.925413][T22941] block nbd6: shutting down sockets [ 7697.143686][ T29] kauditd_printk_skb: 142 callbacks suppressed [ 7697.146640][ T29] audit: type=1400 audit(7953.041:74768): avc: denied { read } for pid=22951 comm="syz.6.7627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7697.161140][ T29] audit: type=1400 audit(7953.051:74769): avc: denied { ioctl } for pid=22951 comm="syz.6.7627" path="socket:[84975]" dev="sockfs" ino=84975 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7697.178283][ T29] audit: type=1400 audit(7953.071:74770): avc: denied { module_request } for pid=22951 comm="syz.6.7627" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7697.239347][ T29] audit: type=1400 audit(7953.111:74771): avc: denied { read } for pid=22954 comm="syz.4.7625" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7697.243725][ T29] audit: type=1400 audit(7953.131:74772): avc: denied { read open } for pid=22954 comm="syz.4.7625" path="/dev/uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7697.295186][ T29] audit: type=1400 audit(7953.161:74773): avc: denied { ioctl } for pid=22954 comm="syz.4.7625" path="/dev/uinput" dev="devtmpfs" ino=698 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7697.319060][ T29] audit: type=1400 audit(7953.211:74774): avc: denied { ioctl } for pid=22954 comm="syz.4.7625" path="/dev/uinput" dev="devtmpfs" ino=698 ioctlcmd=0x5564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7697.347720][ T29] audit: type=1400 audit(7953.241:74775): avc: denied { ioctl } for pid=22954 comm="syz.4.7625" path="/dev/uinput" dev="devtmpfs" ino=698 ioctlcmd=0x556a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7697.366154][ T29] audit: type=1400 audit(7953.261:74776): avc: denied { ioctl } for pid=22954 comm="syz.4.7625" path="/dev/uinput" dev="devtmpfs" ino=698 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7697.391976][T22956] input: syz1 as /devices/virtual/input/input14 [ 7697.563852][ T29] audit: type=1400 audit(7953.441:74777): avc: denied { sys_module } for pid=22951 comm="syz.6.7627" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7699.460667][T22974] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7699.461892][T22974] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7699.992722][T22942] block nbd0: Receive control failed (result -32) [ 7702.897765][ T29] kauditd_printk_skb: 150 callbacks suppressed [ 7702.899120][ T29] audit: type=1400 audit(7958.791:74928): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=172.20.20.170 src=20003 daddr=172.20.20.170 dest=20003 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7703.326681][ T29] audit: type=1400 audit(7959.221:74929): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7703.367695][ T29] audit: type=1400 audit(7959.261:74930): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7703.388789][ T29] audit: type=1400 audit(7959.271:74931): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7703.403426][ T29] audit: type=1400 audit(7959.281:74932): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7703.403654][ T29] audit: type=1400 audit(7959.281:74933): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7703.413568][ T29] audit: type=1400 audit(7959.301:74934): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7703.413823][ T29] audit: type=1400 audit(7959.301:74935): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7703.437170][ T29] audit: type=1400 audit(7959.321:74936): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7703.437494][ T29] audit: type=1400 audit(7959.331:74937): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7708.127596][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 7708.134101][ T29] audit: type=1400 audit(7964.021:74994): avc: denied { create } for pid=23002 comm="syz.6.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7708.188790][ T29] audit: type=1400 audit(7964.081:74995): avc: denied { execmem } for pid=23002 comm="syz.6.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 7712.953867][ T29] audit: type=1400 audit(7968.841:74996): avc: denied { create } for pid=23002 comm="syz.6.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7712.968221][ T29] audit: type=1400 audit(7968.861:74997): avc: denied { write } for pid=23002 comm="syz.6.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7712.989466][ T29] audit: type=1400 audit(7968.881:74998): avc: denied { read } for pid=23002 comm="syz.6.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7712.991764][ T29] audit: type=1400 audit(7968.881:74999): avc: denied { read } for pid=23002 comm="syz.6.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7713.069667][ T29] audit: type=1400 audit(7968.961:75000): avc: denied { write } for pid=23002 comm="syz.6.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7713.203906][ T29] audit: type=1400 audit(7969.081:75001): avc: denied { create } for pid=23002 comm="syz.6.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7713.214583][ T29] audit: type=1400 audit(7969.081:75002): avc: denied { create } for pid=23002 comm="syz.6.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7713.326953][ T29] audit: type=1400 audit(7969.221:75003): avc: denied { create } for pid=23002 comm="syz.6.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 7713.348383][ T29] audit: type=1400 audit(7969.241:75004): avc: denied { prog_load } for pid=23002 comm="syz.6.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7713.350974][ T29] audit: type=1400 audit(7969.241:75005): avc: denied { bpf } for pid=23002 comm="syz.6.7644" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7713.417195][ T29] audit: type=1400 audit(7969.311:75006): avc: denied { perfmon } for pid=23002 comm="syz.6.7644" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7713.419895][ T29] audit: type=1400 audit(7969.311:75007): avc: denied { perfmon } for pid=23002 comm="syz.6.7644" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7713.519154][ T29] audit: type=1400 audit(7969.401:75008): avc: denied { perfmon } for pid=23002 comm="syz.6.7644" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7713.520992][ T29] audit: type=1400 audit(7969.411:75009): avc: denied { perfmon } for pid=23002 comm="syz.6.7644" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7713.553042][ T29] audit: type=1400 audit(7969.441:75010): avc: denied { bpf } for pid=23002 comm="syz.6.7644" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7728.328428][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 7728.329969][ T29] audit: type=1400 audit(7984.221:75015): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7728.331945][ T29] audit: type=1400 audit(7984.221:75016): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7728.359568][ T29] audit: type=1400 audit(7984.251:75017): avc: denied { recv } for pid=22988 comm="syz.4.7639" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7728.381555][ T29] audit: type=1400 audit(7984.271:75018): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7728.385052][ T29] audit: type=1400 audit(7984.271:75019): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7728.409867][ T29] audit: type=1400 audit(7984.301:75020): avc: denied { recv } for pid=22988 comm="syz.4.7639" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7728.411459][ T29] audit: type=1400 audit(7984.301:75021): avc: denied { recv } for pid=22988 comm="syz.4.7639" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7728.433440][ T29] audit: type=1400 audit(7984.321:75022): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7728.452926][ T29] audit: type=1400 audit(7984.331:75023): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7728.750002][ T29] audit: type=1400 audit(7984.641:75024): avc: denied { read write } for pid=23007 comm="syz.6.7645" name="event1" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7733.674943][ T29] kauditd_printk_skb: 69 callbacks suppressed [ 7733.676407][ T29] audit: type=1400 audit(7989.571:75094): avc: denied { sys_module } for pid=23021 comm="syz.6.7651" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7733.696162][ T29] audit: type=1400 audit(7989.591:75095): avc: denied { module_request } for pid=23021 comm="syz.6.7651" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7734.953535][ T29] audit: type=1400 audit(7990.821:75096): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7734.954018][ T29] audit: type=1400 audit(7990.841:75097): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7734.960998][ T29] audit: type=1400 audit(7990.851:75098): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7734.980982][ T29] audit: type=1400 audit(7990.871:75099): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=172.20.20.170 src=20003 daddr=172.20.20.170 dest=20003 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7735.141069][ T29] audit: type=1400 audit(7991.011:75100): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7735.144002][ T29] audit: type=1400 audit(7991.021:75101): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7735.144114][ T29] audit: type=1400 audit(7991.031:75102): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7735.144172][ T29] audit: type=1400 audit(7991.031:75103): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7740.285857][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 7740.288241][ T29] audit: type=1400 audit(7996.181:75136): avc: denied { create } for pid=23031 comm="syz.4.7655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7740.328197][ T29] audit: type=1400 audit(7996.221:75137): avc: denied { read } for pid=23031 comm="syz.4.7655" dev="nsfs" ino=4026532742 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7740.406581][ T29] audit: type=1400 audit(7996.301:75138): avc: denied { read open } for pid=23031 comm="syz.4.7655" path="net:[4026532742]" dev="nsfs" ino=4026532742 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7740.436865][ T29] audit: type=1400 audit(7996.331:75139): avc: denied { create } for pid=23031 comm="syz.4.7655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7740.461870][ T29] audit: type=1400 audit(7996.351:75140): avc: denied { create } for pid=23031 comm="syz.4.7655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7740.471467][ T29] audit: type=1400 audit(7996.361:75141): avc: denied { write } for pid=23031 comm="syz.4.7655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7740.484694][ T29] audit: type=1400 audit(7996.381:75142): avc: denied { write } for pid=23031 comm="syz.4.7655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7740.495767][ T29] audit: type=1400 audit(7996.391:75143): avc: denied { write } for pid=23031 comm="syz.4.7655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7740.559524][ T29] audit: type=1400 audit(7996.451:75144): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7740.559943][ T29] audit: type=1400 audit(7996.451:75145): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7747.517892][ T29] kauditd_printk_skb: 35 callbacks suppressed [ 7747.518864][ T29] audit: type=1400 audit(8003.411:75181): avc: denied { read } for pid=23040 comm="syz.4.7658" name="pcmC0D0c" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7747.556109][ T29] audit: type=1400 audit(8003.451:75182): avc: denied { read open } for pid=23040 comm="syz.4.7658" path="/dev/snd/pcmC0D0c" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7747.571110][ T29] audit: type=1400 audit(8003.461:75183): avc: denied { map } for pid=23040 comm="syz.4.7658" path="/dev/snd/pcmC0D0c" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7747.618208][ T29] audit: type=1400 audit(8003.511:75184): avc: denied { read } for pid=23040 comm="syz.4.7658" path="/dev/snd/pcmC0D0c" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7747.622986][ T29] audit: type=1400 audit(8003.511:75185): avc: denied { ioctl } for pid=23040 comm="syz.4.7658" path="/dev/snd/pcmC0D0c" dev="devtmpfs" ino=726 ioctlcmd=0x4103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7750.733508][ T29] audit: type=1400 audit(8006.621:75186): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7750.748751][ T29] audit: type=1400 audit(8006.641:75187): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7750.787196][ T29] audit: type=1400 audit(8006.671:75188): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7750.789815][ T29] audit: type=1400 audit(8006.671:75189): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7750.793014][ T29] audit: type=1400 audit(8006.681:75190): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7752.560702][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 7752.561869][ T29] audit: type=1400 audit(8008.451:75225): avc: denied { write } for pid=23050 comm="syz.6.7661" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7752.572066][ T29] audit: type=1400 audit(8008.461:75226): avc: denied { write open } for pid=23050 comm="syz.6.7661" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7752.590847][ T29] audit: type=1400 audit(8008.481:75227): avc: denied { allowed } for pid=23050 comm="syz.6.7661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 7752.622719][ T29] audit: type=1400 audit(8008.511:75228): avc: denied { create } for pid=23050 comm="syz.6.7661" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 7752.629928][ T29] audit: type=1400 audit(8008.521:75229): avc: denied { map } for pid=23050 comm="syz.6.7661" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=85331 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 7752.647697][ T29] audit: type=1400 audit(8008.541:75230): avc: denied { read write } for pid=23050 comm="syz.6.7661" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=85331 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 7752.653035][ T29] audit: type=1400 audit(8008.541:75231): avc: denied { map } for pid=23050 comm="syz.6.7661" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=85331 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 7752.679144][ T29] audit: type=1400 audit(8008.571:75232): avc: denied { read write } for pid=23050 comm="syz.6.7661" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=85331 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 7752.767244][ T29] audit: type=1400 audit(8008.661:75233): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7752.803459][ T29] audit: type=1400 audit(8008.691:75234): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7757.773681][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 7757.775518][ T29] audit: type=1400 audit(8013.651:75284): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7757.777316][ T29] audit: type=1400 audit(8013.671:75285): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7757.817834][ T29] audit: type=1400 audit(8013.701:75286): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7757.833608][ T29] audit: type=1400 audit(8013.701:75287): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7757.834089][ T29] audit: type=1400 audit(8013.711:75288): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7757.835097][ T29] audit: type=1400 audit(8013.731:75289): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7757.838841][ T29] audit: type=1400 audit(8013.731:75290): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7757.869444][ T29] audit: type=1400 audit(8013.751:75291): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7757.870044][ T29] audit: type=1400 audit(8013.761:75292): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7758.297972][ T29] audit: type=1400 audit(8014.181:75293): avc: denied { map_create } for pid=23064 comm="syz.6.7666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7773.443072][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 7773.448859][ T29] audit: type=1400 audit(8029.331:75305): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7773.449290][ T29] audit: type=1400 audit(8029.341:75306): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7773.472900][ T29] audit: type=1400 audit(8029.361:75307): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7773.473156][ T29] audit: type=1400 audit(8029.361:75308): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7773.475231][ T29] audit: type=1400 audit(8029.371:75309): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7773.503013][ T29] audit: type=1400 audit(8029.391:75310): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7773.503508][ T29] audit: type=1400 audit(8029.391:75311): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7773.516836][ T29] audit: type=1400 audit(8029.411:75312): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7773.522194][ T29] audit: type=1400 audit(8029.411:75313): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7774.384712][ T29] audit: type=1400 audit(8030.281:75314): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7775.434854][T23078] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7775.443513][T23078] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7776.490843][T23084] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7776.496537][T23084] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7778.505062][ T29] kauditd_printk_skb: 106 callbacks suppressed [ 7778.506252][ T29] audit: type=1400 audit(8034.381:75421): avc: denied { prog_load } for pid=23091 comm="syz.6.7676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7778.512035][ T29] audit: type=1400 audit(8034.401:75422): avc: denied { bpf } for pid=23091 comm="syz.6.7676" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7778.546151][ T29] audit: type=1400 audit(8034.441:75423): avc: denied { perfmon } for pid=23091 comm="syz.6.7676" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7778.550187][ T29] audit: type=1400 audit(8034.441:75424): avc: denied { perfmon } for pid=23091 comm="syz.6.7676" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7778.587908][ T29] audit: type=1400 audit(8034.481:75425): avc: denied { perfmon } for pid=23091 comm="syz.6.7676" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7778.589970][ T29] audit: type=1400 audit(8034.481:75426): avc: denied { perfmon } for pid=23091 comm="syz.6.7676" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7778.591595][ T29] audit: type=1400 audit(8034.481:75427): avc: denied { perfmon } for pid=23091 comm="syz.6.7676" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7778.603047][ T29] audit: type=1400 audit(8034.491:75428): avc: denied { bpf } for pid=23091 comm="syz.6.7676" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7778.633055][ T29] audit: type=1400 audit(8034.521:75429): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7778.635965][ T29] audit: type=1400 audit(8034.531:75430): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.813646][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 7783.815199][ T29] audit: type=1400 audit(8039.681:75461): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.817901][ T29] audit: type=1400 audit(8039.681:75462): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.868678][ T29] audit: type=1400 audit(8039.761:75463): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.876046][ T29] audit: type=1400 audit(8039.761:75464): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.884394][ T29] audit: type=1400 audit(8039.771:75465): avc: denied { recv } for pid=2818 comm="pr/ttyAMA-1" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.905910][ T29] audit: type=1400 audit(8039.791:75466): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.907941][ T29] audit: type=1400 audit(8039.791:75467): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.943750][ T29] audit: type=1400 audit(8039.811:75468): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.944044][ T29] audit: type=1400 audit(8039.811:75469): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7785.051163][ T29] audit: type=1400 audit(8040.941:75470): avc: denied { create } for pid=23098 comm="syz.4.7679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7792.583507][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 7792.584160][ T29] audit: type=1400 audit(8048.471:75472): avc: denied { name_bind } for pid=23098 comm="syz.4.7679" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 7792.589427][ T29] audit: type=1400 audit(8048.481:75473): avc: denied { node_bind } for pid=23098 comm="syz.4.7679" saddr=224.0.0.2 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 7792.674784][ T29] audit: type=1400 audit(8048.571:75474): avc: denied { name_bind } for pid=23098 comm="syz.4.7679" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 7792.691364][ T29] audit: type=1400 audit(8048.581:75475): avc: denied { node_bind } for pid=23098 comm="syz.4.7679" saddr=224.0.0.2 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 7793.880716][ T29] audit: type=1400 audit(8049.771:75476): avc: denied { prog_load } for pid=23098 comm="syz.4.7679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7793.911924][ T29] audit: type=1400 audit(8049.791:75477): avc: denied { bpf } for pid=23098 comm="syz.4.7679" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7794.037263][ T29] audit: type=1400 audit(8049.911:75478): avc: denied { perfmon } for pid=23098 comm="syz.4.7679" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7794.062828][ T29] audit: type=1400 audit(8049.911:75479): avc: denied { perfmon } for pid=23098 comm="syz.4.7679" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7794.159176][ T29] audit: type=1400 audit(8050.051:75480): avc: denied { perfmon } for pid=23098 comm="syz.4.7679" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7794.178158][ T29] audit: type=1400 audit(8050.061:75481): avc: denied { perfmon } for pid=23098 comm="syz.4.7679" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7795.903359][T23104] input: syz1 as /devices/virtual/input/input15 [ 7799.448213][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 7799.456650][ T29] audit: type=1400 audit(8055.331:75522): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7799.457265][ T29] audit: type=1400 audit(8055.341:75523): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7799.499219][ T29] audit: type=1400 audit(8055.391:75524): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7799.499731][ T29] audit: type=1400 audit(8055.391:75525): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7799.508193][ T29] audit: type=1400 audit(8055.401:75526): avc: denied { recv } for pid=11194 comm="kworker/u8:7" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7799.535660][ T29] audit: type=1400 audit(8055.431:75527): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7799.538174][ T29] audit: type=1400 audit(8055.431:75528): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7799.587684][ T29] audit: type=1400 audit(8055.471:75529): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7799.588186][ T29] audit: type=1400 audit(8055.481:75530): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7799.836660][ T29] audit: type=1400 audit(8055.721:75531): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7804.027048][T23122] netlink: 12 bytes leftover after parsing attributes in process `syz.6.7686'. [ 7804.748610][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 7804.749614][ T29] audit: type=1400 audit(8060.641:75586): avc: denied { read } for pid=23123 comm="syz.6.7687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7804.775723][ T29] audit: type=1400 audit(8060.671:75587): avc: denied { write } for pid=23123 comm="syz.6.7687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7804.812001][ T29] audit: type=1400 audit(8060.701:75588): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7804.853456][ T29] audit: type=1400 audit(8060.741:75589): avc: denied { recv } for pid=21089 comm="syz.4.7104" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7804.859392][ T29] audit: type=1400 audit(8060.751:75590): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7804.885416][ T29] audit: type=1400 audit(8060.761:75591): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7804.886481][ T29] audit: type=1400 audit(8060.771:75592): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7804.904827][ T29] audit: type=1400 audit(8060.801:75593): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7804.908696][ T29] audit: type=1400 audit(8060.801:75594): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7804.971166][ T29] audit: type=1400 audit(8060.861:75595): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.834064][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 7818.835287][ T29] audit: type=1400 audit(8074.721:75609): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.837227][ T29] audit: type=1400 audit(8074.721:75610): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.845314][ T29] audit: type=1400 audit(8074.731:75611): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.845599][ T29] audit: type=1400 audit(8074.741:75612): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.861017][ T29] audit: type=1400 audit(8074.751:75613): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.865471][ T29] audit: type=1400 audit(8074.761:75614): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.897498][ T29] audit: type=1400 audit(8074.791:75615): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.913650][ T29] audit: type=1400 audit(8074.791:75616): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.913982][ T29] audit: type=1400 audit(8074.801:75617): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.914185][ T29] audit: type=1400 audit(8074.801:75618): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7819.056747][T23132] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7819.058999][T23132] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7823.888006][ T29] kauditd_printk_skb: 93 callbacks suppressed [ 7823.889273][ T29] audit: type=1400 audit(8079.781:75712): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7823.892082][ T29] audit: type=1400 audit(8079.781:75713): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.749052][ T29] audit: type=1400 audit(8080.621:75714): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.749609][ T29] audit: type=1400 audit(8080.631:75715): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.778263][ T29] audit: type=1400 audit(8080.671:75716): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.963014][ T29] audit: type=1400 audit(8080.821:75717): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.965093][ T29] audit: type=1400 audit(8080.851:75718): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.991798][ T29] audit: type=1400 audit(8080.881:75719): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.995230][ T29] audit: type=1400 audit(8080.881:75720): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7825.031917][ T29] audit: type=1400 audit(8080.921:75721): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.673539][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 7829.677281][ T29] audit: type=1400 audit(8085.551:75763): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.677822][ T29] audit: type=1400 audit(8085.561:75764): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.729024][ T29] audit: type=1400 audit(8085.621:75765): avc: denied { recv } for pid=22496 comm="kworker/0:3" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.857372][ T29] audit: type=1400 audit(8085.741:75766): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.857864][ T29] audit: type=1400 audit(8085.751:75767): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.918291][ T29] audit: type=1400 audit(8085.801:75768): avc: denied { recv } for pid=20275 comm="syz-executor" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.920358][ T29] audit: type=1400 audit(8085.811:75769): avc: denied { recv } for pid=20275 comm="syz-executor" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.974092][ T29] audit: type=1400 audit(8085.851:75770): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.974486][ T29] audit: type=1400 audit(8085.871:75771): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7831.344174][ T29] audit: type=1400 audit(8087.241:75772): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7837.041583][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 7837.043592][ T29] audit: type=1400 audit(8092.931:75798): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7837.043979][ T29] audit: type=1400 audit(8092.931:75799): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7837.126323][ T29] audit: type=1400 audit(8093.021:75800): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7837.128645][ T29] audit: type=1400 audit(8093.021:75801): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7837.149711][ T29] audit: type=1400 audit(8093.031:75802): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7837.183469][ T29] audit: type=1400 audit(8093.071:75803): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7837.183935][ T29] audit: type=1400 audit(8093.081:75804): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7837.217847][ T29] audit: type=1400 audit(8093.111:75805): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7837.223190][ T29] audit: type=1400 audit(8093.111:75806): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7839.272947][ T29] audit: type=1400 audit(8095.161:75807): avc: denied { name_bind } for pid=23172 comm="syz.4.7705" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 7844.458984][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 7844.463558][ T29] audit: type=1400 audit(8100.351:75832): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.464122][ T29] audit: type=1400 audit(8100.351:75833): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.480341][ T29] audit: type=1400 audit(8100.371:75834): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.494175][ T29] audit: type=1400 audit(8100.381:75835): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.499547][ T29] audit: type=1400 audit(8100.391:75836): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.520097][ T29] audit: type=1400 audit(8100.411:75837): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.523517][ T29] audit: type=1400 audit(8100.421:75838): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.548270][ T29] audit: type=1400 audit(8100.441:75839): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.553759][ T29] audit: type=1400 audit(8100.451:75840): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7845.194692][ T29] audit: type=1400 audit(8101.081:75841): avc: denied { read } for pid=23179 comm="syz.4.7708" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7847.514319][T23190] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7847.518548][T23190] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7849.506029][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 7849.507808][ T29] audit: type=1400 audit(8105.401:75900): avc: denied { create } for pid=23193 comm="syz.6.7713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7849.521011][ T29] audit: type=1400 audit(8105.411:75901): avc: denied { ioctl } for pid=23193 comm="syz.6.7713" path="socket:[86367]" dev="sockfs" ino=86367 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7849.535347][T23194] netlink: 884 bytes leftover after parsing attributes in process `syz.6.7713'. [ 7849.580627][ T29] audit: type=1400 audit(8105.471:75902): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.609043][ T29] audit: type=1400 audit(8105.491:75903): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.627843][ T29] audit: type=1400 audit(8105.521:75904): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.643080][ T29] audit: type=1400 audit(8105.521:75905): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.643708][ T29] audit: type=1400 audit(8105.531:75906): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.675076][ T29] audit: type=1400 audit(8105.571:75907): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.679458][ T29] audit: type=1400 audit(8105.571:75908): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.730958][ T29] audit: type=1400 audit(8105.621:75909): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7859.198849][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 7859.203197][ T29] audit: type=1400 audit(8115.091:75928): avc: denied { recv } for pid=21089 comm="syz.4.7104" saddr=fe80::2 daddr=ff02::1 netif=eth0 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7859.684786][ T29] audit: type=1400 audit(8115.581:75929): avc: denied { write } for pid=23203 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7859.687605][ T29] audit: type=1400 audit(8115.581:75930): avc: denied { write open } for pid=23203 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7859.712787][ T29] audit: type=1400 audit(8115.591:75931): avc: denied { search } for pid=23203 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7859.713241][ T29] audit: type=1400 audit(8115.601:75932): avc: denied { search } for pid=23203 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7859.713369][ T29] audit: type=1400 audit(8115.601:75933): avc: denied { search } for pid=23203 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7859.713418][ T29] audit: type=1400 audit(8115.601:75934): avc: denied { search } for pid=23203 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7859.805818][ T29] audit: type=1400 audit(8115.701:75935): avc: denied { search } for pid=23204 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7859.806187][ T29] audit: type=1400 audit(8115.701:75936): avc: denied { search } for pid=23204 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7859.806809][ T29] audit: type=1400 audit(8115.701:75937): avc: denied { search } for pid=23204 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7864.326661][ T29] kauditd_printk_skb: 348 callbacks suppressed [ 7864.330725][ T29] audit: type=1400 audit(8120.221:76286): avc: denied { search } for pid=23210 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7864.331236][ T29] audit: type=1400 audit(8120.221:76287): avc: denied { search } for pid=23210 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7864.331365][ T29] audit: type=1400 audit(8120.221:76288): avc: denied { search } for pid=23210 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7864.364200][ T29] audit: type=1400 audit(8120.251:76289): avc: denied { search } for pid=23203 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7866.213770][ T29] audit: type=1400 audit(8122.111:76290): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7866.218179][ T29] audit: type=1400 audit(8122.111:76291): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7866.267998][ T29] audit: type=1400 audit(8122.141:76292): avc: denied { recv } for pid=21542 comm="syz-executor" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7866.268308][ T29] audit: type=1400 audit(8122.161:76293): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7866.270761][ T29] audit: type=1400 audit(8122.161:76294): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7866.284790][ T29] audit: type=1400 audit(8122.181:76295): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.356627][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 7869.358140][ T29] audit: type=1400 audit(8125.211:76314): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.360107][ T29] audit: type=1400 audit(8125.231:76315): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.362238][ T29] audit: type=1400 audit(8125.251:76316): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.406124][ T29] audit: type=1400 audit(8125.291:76317): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.408585][ T29] audit: type=1400 audit(8125.291:76318): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.424246][ T29] audit: type=1400 audit(8125.311:76319): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.427365][ T29] audit: type=1400 audit(8125.321:76320): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7870.062821][ T29] audit: type=1400 audit(8125.951:76321): avc: denied { create } for pid=23219 comm="syz.6.7720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7870.103338][ T29] audit: type=1400 audit(8125.991:76322): avc: denied { create } for pid=23219 comm="syz.6.7720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7870.108927][ T29] audit: type=1400 audit(8126.001:76323): avc: denied { write } for pid=23219 comm="syz.6.7720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7876.607250][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 7876.608425][ T29] audit: type=1400 audit(8132.501:76351): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7876.611023][ T29] audit: type=1400 audit(8132.501:76352): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7876.653104][ T29] audit: type=1400 audit(8132.531:76353): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7876.655084][ T29] audit: type=1400 audit(8132.541:76354): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7876.657104][ T29] audit: type=1400 audit(8132.541:76355): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7876.705478][ T29] audit: type=1400 audit(8132.591:76356): avc: denied { recv } for pid=21089 comm="syz.4.7104" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7876.707590][ T29] audit: type=1400 audit(8132.591:76357): avc: denied { recv } for pid=21089 comm="syz.4.7104" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7876.742847][ T29] audit: type=1400 audit(8132.621:76358): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7876.743406][ T29] audit: type=1400 audit(8132.631:76359): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7876.750104][ T29] audit: type=1400 audit(8132.641:76360): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7881.613286][ T29] kauditd_printk_skb: 76 callbacks suppressed [ 7881.614776][ T29] audit: type=1400 audit(8137.481:76437): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7881.615031][ T29] audit: type=1400 audit(8137.501:76438): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7881.635487][ T29] audit: type=1400 audit(8137.531:76439): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7881.807641][ T29] audit: type=1400 audit(8137.701:76440): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7881.826218][ T29] audit: type=1400 audit(8137.701:76441): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7881.839854][ T29] audit: type=1400 audit(8137.731:76442): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7881.846007][ T29] audit: type=1400 audit(8137.741:76443): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7881.903602][ T29] audit: type=1400 audit(8137.781:76444): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7881.904144][ T29] audit: type=1400 audit(8137.791:76445): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7882.220334][ T29] audit: type=1400 audit(8138.111:76446): avc: denied { create } for pid=23243 comm="syz.4.7728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7886.642274][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 7886.653543][ T29] audit: type=1400 audit(8142.531:76491): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7886.654162][ T29] audit: type=1400 audit(8142.531:76492): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7886.714542][ T29] audit: type=1400 audit(8142.561:76493): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7886.714958][ T29] audit: type=1400 audit(8142.561:76494): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7886.715180][ T29] audit: type=1400 audit(8142.571:76495): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7886.715294][ T29] audit: type=1400 audit(8142.611:76496): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7886.841089][ T29] audit: type=1400 audit(8142.731:76497): avc: denied { recv } for pid=20275 comm="syz-executor" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7886.846370][ T29] audit: type=1400 audit(8142.731:76498): avc: denied { recv } for pid=20275 comm="syz-executor" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7887.028305][ T29] audit: type=1400 audit(8142.921:76499): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7887.077725][ T29] audit: type=1400 audit(8142.971:76500): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7888.419349][T23263] netlink: 12 bytes leftover after parsing attributes in process `syz.4.7734'. [ 7888.787167][T23263] 8021q: adding VLAN 0 to HW filter on device bond1 [ 7889.047552][T23301] netlink: 88 bytes leftover after parsing attributes in process `syz.6.7736'. [ 7891.979744][ T29] kauditd_printk_skb: 87 callbacks suppressed [ 7891.980924][ T29] audit: type=1400 audit(8147.871:76588): avc: denied { read write } for pid=23311 comm="syz.6.7742" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7892.007207][ T29] audit: type=1400 audit(8147.901:76589): avc: denied { read write open } for pid=23311 comm="syz.6.7742" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7892.030581][ T29] audit: type=1400 audit(8147.921:76590): avc: denied { ioctl } for pid=23311 comm="syz.6.7742" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7892.048314][ T29] audit: type=1400 audit(8147.941:76591): avc: denied { ioctl } for pid=23311 comm="syz.6.7742" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7892.064183][T23312] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7892.069494][T23312] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7892.135195][ T29] audit: type=1400 audit(8148.031:76592): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7892.139682][ T29] audit: type=1400 audit(8148.031:76593): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7892.154828][ T29] audit: type=1400 audit(8148.051:76594): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7892.184499][ T29] audit: type=1400 audit(8148.081:76595): avc: denied { prog_load } for pid=23310 comm="syz.4.7741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7892.189961][ T29] audit: type=1400 audit(8148.081:76596): avc: denied { bpf } for pid=23310 comm="syz.4.7741" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7892.233813][ T29] audit: type=1400 audit(8148.131:76597): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7894.460114][T23325] cgroup: Unknown subsys name 'hugetlb' [ 7897.155720][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 7897.156666][ T29] audit: type=1400 audit(8153.041:76659): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7897.158068][ T29] audit: type=1400 audit(8153.051:76660): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7897.186802][ T29] audit: type=1400 audit(8153.071:76661): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7897.189289][ T29] audit: type=1400 audit(8153.081:76662): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7897.192091][ T29] audit: type=1400 audit(8153.081:76663): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7897.235148][ T29] audit: type=1400 audit(8153.131:76664): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7897.238507][ T29] audit: type=1400 audit(8153.131:76665): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7897.284725][ T29] audit: type=1400 audit(8153.181:76666): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7897.289270][ T29] audit: type=1400 audit(8153.181:76667): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7897.628338][ T29] audit: type=1400 audit(8153.521:76668): avc: denied { read write } for pid=23332 comm="syz.6.7749" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7897.650014][T23333] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7897.654603][T23333] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7898.024399][T23337] netlink: 20 bytes leftover after parsing attributes in process `syz.6.7750'. [ 7901.329091][T23344] macvlan0: entered promiscuous mode [ 7901.336506][T23344] netlink: 'syz.6.7752': attribute type 1 has an invalid length. [ 7901.338533][T23344] netlink: 'syz.6.7752': attribute type 2 has an invalid length. [ 7902.178240][ T29] kauditd_printk_skb: 64 callbacks suppressed [ 7902.179613][ T29] audit: type=1400 audit(8158.061:76733): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7902.182078][ T29] audit: type=1400 audit(8158.071:76734): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7902.210211][ T29] audit: type=1400 audit(8158.101:76735): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7902.214122][ T29] audit: type=1400 audit(8158.111:76736): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7902.251378][ T29] audit: type=1400 audit(8158.141:76737): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7902.256861][ T29] audit: type=1400 audit(8158.151:76738): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7902.447006][ T29] audit: type=1400 audit(8158.341:76739): avc: denied { create } for pid=23349 comm="syz.6.7755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7902.458908][ T29] audit: type=1400 audit(8158.351:76740): avc: denied { setopt } for pid=23349 comm="syz.6.7755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7902.493111][ T29] audit: type=1400 audit(8158.371:76741): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7902.495156][ T29] audit: type=1400 audit(8158.381:76742): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7907.196765][ T29] kauditd_printk_skb: 85 callbacks suppressed [ 7907.199930][ T29] audit: type=1400 audit(8163.091:76828): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7907.200759][ T29] audit: type=1400 audit(8163.091:76829): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7907.819081][ T29] audit: type=1400 audit(8163.711:76830): avc: denied { create } for pid=23371 comm="syz.6.7762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7907.860178][ T29] audit: type=1400 audit(8163.751:76831): avc: denied { create } for pid=23371 comm="syz.6.7762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7907.943028][ T29] audit: type=1400 audit(8163.831:76832): avc: denied { write } for pid=23371 comm="syz.6.7762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7907.945183][ T29] audit: type=1400 audit(8163.831:76833): avc: denied { read } for pid=23371 comm="syz.6.7762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7908.044182][ T29] audit: type=1400 audit(8163.941:76834): avc: denied { read } for pid=23371 comm="syz.6.7762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7908.066783][ T29] audit: type=1400 audit(8163.961:76835): avc: denied { write } for pid=23371 comm="syz.6.7762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7908.181106][ T29] audit: type=1400 audit(8164.061:76836): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7908.181859][ T29] audit: type=1400 audit(8164.071:76837): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7909.794040][T23377] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7909.798238][T23377] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7912.353927][ T29] kauditd_printk_skb: 52 callbacks suppressed [ 7912.354973][ T29] audit: type=1400 audit(8168.241:76890): avc: denied { read write } for pid=23384 comm="syz.6.7767" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7912.385753][ T29] audit: type=1400 audit(8168.281:76891): avc: denied { read write open } for pid=23384 comm="syz.6.7767" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7912.500733][ T29] audit: type=1400 audit(8168.391:76892): avc: denied { ioctl } for pid=23384 comm="syz.6.7767" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7912.508868][ T29] audit: type=1400 audit(8168.401:76893): avc: denied { ioctl } for pid=23384 comm="syz.6.7767" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7912.522073][T23385] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7912.581745][T23385] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7912.674970][ T29] audit: type=1400 audit(8168.571:76894): avc: denied { write } for pid=23384 comm="syz.6.7767" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7912.679414][ T29] audit: type=1400 audit(8168.571:76895): avc: denied { write open } for pid=23384 comm="syz.6.7767" path="/dev/uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7912.709902][ T29] audit: type=1400 audit(8168.601:76896): avc: denied { ioctl } for pid=23384 comm="syz.6.7767" path="/dev/uinput" dev="devtmpfs" ino=698 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7912.772893][ T29] audit: type=1400 audit(8168.661:76897): avc: denied { ioctl } for pid=23384 comm="syz.6.7767" path="/dev/uinput" dev="devtmpfs" ino=698 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7912.843176][T23385] input: syz1 as /devices/virtual/input/input16 [ 7913.058760][ T29] audit: type=1400 audit(8168.941:76898): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7913.060947][ T29] audit: type=1400 audit(8168.951:76899): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7916.696400][T23404] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=23404 comm=syz.6.7772 [ 7917.508208][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 7917.511985][ T29] audit: type=1400 audit(8173.401:76968): avc: denied { read } for pid=23407 comm="syz.6.7774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7917.539417][ T29] audit: type=1400 audit(8173.431:76969): avc: denied { create } for pid=23407 comm="syz.6.7774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7917.574054][ T29] audit: type=1400 audit(8173.451:76970): avc: denied { ioctl } for pid=23407 comm="syz.6.7774" path="socket:[86549]" dev="sockfs" ino=86549 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7917.580175][ T29] audit: type=1400 audit(8173.471:76971): avc: denied { module_request } for pid=23407 comm="syz.6.7774" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7917.879648][ T29] audit: type=1400 audit(8173.771:76972): avc: denied { sys_module } for pid=23407 comm="syz.6.7774" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7917.897935][ T29] audit: type=1400 audit(8173.791:76973): avc: denied { module_request } for pid=23407 comm="syz.6.7774" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7918.087534][ T29] audit: type=1400 audit(8173.981:76974): avc: denied { write } for pid=23407 comm="syz.6.7774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7918.244110][ T29] audit: type=1400 audit(8174.141:76975): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7918.264121][ T29] audit: type=1400 audit(8174.151:76976): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7918.297602][ T29] audit: type=1400 audit(8174.191:76977): avc: denied { recv } for pid=21089 comm="syz.4.7104" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7922.563343][ T29] kauditd_printk_skb: 113 callbacks suppressed [ 7922.567504][ T29] audit: type=1400 audit(8178.451:77091): avc: denied { read } for pid=23434 comm="syz.6.7783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7922.600119][ T29] audit: type=1400 audit(8178.491:77092): avc: denied { write } for pid=23434 comm="syz.6.7783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7922.648417][ T29] audit: type=1400 audit(8178.541:77093): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7922.648841][ T29] audit: type=1400 audit(8178.541:77094): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7922.673302][ T29] audit: type=1400 audit(8178.561:77095): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7922.727362][ T29] audit: type=1400 audit(8178.611:77096): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7922.727842][ T29] audit: type=1400 audit(8178.621:77097): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7922.744961][ T29] audit: type=1400 audit(8178.631:77098): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7922.745380][ T29] audit: type=1400 audit(8178.641:77099): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7922.851579][ T29] audit: type=1400 audit(8178.741:77100): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7927.246559][T23449] netlink: 8 bytes leftover after parsing attributes in process `syz.4.7789'. [ 7927.247394][T23449] netlink: 12 bytes leftover after parsing attributes in process `syz.4.7789'. [ 7927.247557][T23449] netlink: 20 bytes leftover after parsing attributes in process `syz.4.7789'. [ 7927.729440][ T29] kauditd_printk_skb: 93 callbacks suppressed [ 7927.730486][ T29] audit: type=1400 audit(8183.621:77194): avc: denied { read } for pid=23450 comm="syz.4.7790" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7927.747648][ T29] audit: type=1400 audit(8183.641:77195): avc: denied { read open } for pid=23450 comm="syz.4.7790" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7927.776935][ T29] audit: type=1400 audit(8183.671:77196): avc: denied { ioctl } for pid=23450 comm="syz.4.7790" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x6403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7927.831840][ T29] audit: type=1400 audit(8183.721:77197): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7927.854062][ T29] audit: type=1400 audit(8183.741:77198): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7927.889559][ T29] audit: type=1400 audit(8183.771:77199): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7927.890105][ T29] audit: type=1400 audit(8183.781:77200): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7927.892680][ T29] audit: type=1400 audit(8183.781:77201): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7927.954953][ T29] audit: type=1400 audit(8183.841:77202): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7927.955597][ T29] audit: type=1400 audit(8183.841:77203): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=43472 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7933.397203][ T29] kauditd_printk_skb: 112 callbacks suppressed [ 7933.399384][ T29] audit: type=1400 audit(8189.291:77316): avc: denied { mounton } for pid=23470 comm="syz.6.7800" path="/proc/799/task" dev="proc" ino=86659 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 7933.472880][ T29] audit: type=1400 audit(8189.351:77317): avc: denied { mount } for pid=23470 comm="syz.6.7800" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 7933.545352][ T29] audit: type=1400 audit(8189.441:77318): avc: denied { create } for pid=23469 comm="syz.4.7799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7933.548290][ T29] audit: type=1400 audit(8189.441:77319): avc: denied { module_request } for pid=23469 comm="syz.4.7799" kmod="net-pf-10-proto-0-type-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7933.667562][ T29] audit: type=1400 audit(8189.561:77320): avc: denied { execmem } for pid=23470 comm="syz.6.7800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 7934.466466][ T29] audit: type=1400 audit(8190.361:77321): avc: denied { module_request } for pid=23469 comm="syz.4.7799" kmod="net-pf-10-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7935.524783][ T29] audit: type=1400 audit(8191.401:77322): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7935.526397][ T29] audit: type=1400 audit(8191.401:77323): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7935.527950][ T29] audit: type=1400 audit(8191.411:77324): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=38108 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7935.529371][ T29] audit: type=1400 audit(8191.421:77325): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38108 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7937.057281][T23478] 8<--- cut here --- [ 7937.057789][T23478] Unable to handle kernel paging request at virtual address fee04f2c when write [ 7937.069785][T23478] [fee04f2c] *pgd=80000080007003, *pmd=00000000 [ 7937.102580][T23478] Internal error: Oops: a06 [#1] SMP ARM [ 7937.105044][T23478] Modules linked in: [ 7937.105523][T23478] CPU: 0 UID: 0 PID: 23478 Comm: syz.4.7801 Tainted: G L syzkaller #0 PREEMPT [ 7937.105920][T23478] Tainted: [L]=SOFTLOCKUP [ 7937.106141][T23478] Hardware name: ARM-Versatile Express [ 7937.106412][T23478] PC is at subdev_8255_io+0x60/0x6c [ 7937.106711][T23478] LR is at subdev_8255_io+0x4c/0x6c [ 7937.106950][T23478] pc : [<814161dc>] lr : [<814161c8>] psr: 60000013 [ 7937.107273][T23478] sp : e02f1cb0 ip : e02f1cb0 fp : e02f1ccc [ 7937.107555][T23478] r10: 00000001 r9 : 00000084 r8 : e02f1d9c [ 7937.107806][T23478] r7 : 00004f29 r6 : 0000009b r5 : 838796c0 r4 : 00004f2c [ 7937.108126][T23478] r3 : 0000009b r2 : fee04f2c r1 : 00000001 r0 : 838796c0 [ 7937.108536][T23478] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 7937.108868][T23478] Control: 30c5387d Table: 86ce4100 DAC: fffffffd [ 7937.109184][T23478] Register r0 information: slab kmalloc-192 start 838796c0 pointer offset 0 size 192 [ 7937.110322][T23478] Register r1 information: non-paged memory [ 7937.110828][T23478] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 7937.111423][T23478] Register r3 information: non-paged memory [ 7937.111680][T23478] Register r4 information: non-paged memory [ 7937.111928][T23478] Register r5 information: slab kmalloc-192 start 838796c0 pointer offset 0 size 192 [ 7937.112730][T23478] Register r6 information: non-paged memory [ 7937.113131][T23478] Register r7 information: non-paged memory [ 7937.113381][T23478] Register r8 information: 2-page vmalloc region starting at 0xe02f0000 allocated at kernel_clone+0xac/0x3ec [ 7937.117975][T23478] Register r9 information: non-paged memory [ 7937.122680][T23478] Register r10 information: non-paged memory [ 7937.123137][T23478] Register r11 information: 2-page vmalloc region starting at 0xe02f0000 allocated at kernel_clone+0xac/0x3ec [ 7937.128062][T23478] Register r12 information: 2-page vmalloc region starting at 0xe02f0000 allocated at kernel_clone+0xac/0x3ec [ 7937.132210][T23478] Process syz.4.7801 (pid: 23478, stack limit = 0xe02f0000) [ 7937.132687][T23478] Stack: (0xe02f1cb0 to 0xe02f2000) [ 7937.132961][T23478] 1ca0: 8141617c 838796c0 00004f29 00004f29 [ 7937.133283][T23478] 1cc0: e02f1cec e02f1cd0 81415eb4 81416188 00004f29 805150ac 85e94000 85e94000 [ 7937.133590][T23478] 1ce0: e02f1d0c e02f1cf0 81416274 81415e68 838796c0 00000000 85e94000 00004f29 [ 7937.133943][T23478] 1d00: e02f1d4c e02f1d10 81416420 814161f4 0000005f 8385e080 828217b0 00000000 [ 7937.134260][T23478] 1d20: 00000000 829d46a0 838796c0 83879704 e02f1d88 838796c0 00000000 82b28ad8 [ 7937.134562][T23478] 1d40: e02f1d84 e02f1d50 81404f54 814163b8 838796f0 00000000 e02f1d74 200000c0 [ 7937.135217][T23478] 1d60: 838796c0 b5403587 838796f0 851b2400 40946400 00000003 e02f1e44 e02f1d88 [ 7937.135614][T23478] 1d80: 814008ac 81404e58 35353238 00000000 00000000 00000000 00000000 00004f29 [ 7937.136026][T23478] 1da0: 00000005 00000003 00000004 00000001 00000003 00000012 00000011 00000081 [ 7937.136346][T23478] 1dc0: fffffffc 00000002 fffffffe 00000001 00000001 00000002 00000101 00000008 [ 7937.136652][T23478] 1de0: 00400009 00000003 00000005 00000099 0000caa7 00000080 00000204 00000007 [ 7937.136977][T23478] 1e00: 02000e67 0000003c 00000008 fffffffe 00000000 fffffff4 00000000 99696256 [ 7937.137275][T23478] 1e20: 00000000 85b8e000 838796c0 200000c0 838796f0 851b2400 e02f1f14 e02f1e48 [ 7937.137574][T23478] 1e40: 814018a0 814007b8 00000000 00000000 00000000 e02f1e54 e02f1e54 99696256 [ 7937.137873][T23478] 1e60: 00000000 00000000 824a45ec 0000005f 84547600 00000064 838b3e64 851b2400 [ 7937.138245][T23478] 1e80: e02f1ee4 e02f1e90 807b8180 807ae6a4 00000064 00000001 00000000 e02f1eac [ 7937.138547][T23478] 1ea0: 833dec10 834d5330 00006400 0000000b e02f1ea0 00000000 e02f1d40 99696256 [ 7937.138837][T23478] 1ec0: 85b8e000 40946400 200000c0 200000c0 85b8e000 00000003 e02f1ef4 e02f1ee8 [ 7937.139175][T23478] 1ee0: 807b82a0 99696256 e02f1f14 40946400 00000000 85b8e001 200000c0 85b8e000 [ 7937.139506][T23478] 1f00: 00000003 851b2400 e02f1fa4 e02f1f18 80585768 814012f0 ecac8b10 851b2400 [ 7937.139803][T23478] 1f20: e02f1f3c e02f1f30 81ab004c 81aaff1c e02f1f54 e02f1f40 8025bcbc 8028e0c4 [ 7937.140120][T23478] 1f40: e02f1fb0 40000000 e02f1f84 e02f1f58 80221a38 8025bc78 00000000 8281d17c [ 7937.140419][T23478] 1f60: e02f1fb0 0014c8c0 ecac8b10 8022198c 00000000 99696256 e02f1fac 00000000 [ 7937.140717][T23478] 1f80: 00000000 00326310 00000036 8020029c 851b2400 00000036 00000000 e02f1fa8 [ 7937.141036][T23478] 1fa0: 80200060 80585644 00000000 00000000 00000003 40946400 200000c0 00000000 [ 7937.141333][T23478] 1fc0: 00000000 00000000 00326310 00000036 00310000 00000000 00006364 76fb80bc [ 7937.141653][T23478] 1fe0: 76fb7ec0 76fb7eb0 000192bc 00132360 60000010 00000003 00000000 00000000 [ 7937.142012][T23478] Call trace: [ 7937.142465][T23478] [<8141617c>] (subdev_8255_io) from [<81415eb4>] (subdev_8255_do_config+0x58/0x60) [ 7937.143082][T23478] r7:00004f29 r6:00004f29 r5:838796c0 r4:8141617c [ 7937.143556][T23478] [<81415e5c>] (subdev_8255_do_config) from [<81416274>] (subdev_8255_io_init+0x8c/0x9c) [ 7937.148927][T23478] r4:85e94000 [ 7937.150706][T23478] [<814161e8>] (subdev_8255_io_init) from [<81416420>] (dev_8255_attach+0x74/0x120) [ 7937.152851][T23478] r7:00004f29 r6:85e94000 r5:00000000 r4:838796c0 [ 7937.153309][T23478] [<814163ac>] (dev_8255_attach) from [<81404f54>] (comedi_device_attach+0x108/0x250) [ 7937.153865][T23478] r10:82b28ad8 r9:00000000 r8:838796c0 r7:e02f1d88 r6:83879704 r5:838796c0 [ 7937.154195][T23478] r4:829d46a0 [ 7937.154380][T23478] [<81404e4c>] (comedi_device_attach) from [<814008ac>] (do_devconfig_ioctl+0x100/0x220) [ 7937.156498][T23478] r10:00000003 r9:40946400 r8:851b2400 r7:838796f0 r6:b5403587 r5:838796c0 [ 7937.159533][T23478] r4:200000c0 [ 7937.160677][T23478] [<814007ac>] (do_devconfig_ioctl) from [<814018a0>] (comedi_unlocked_ioctl+0x5bc/0x1c2c) [ 7937.162799][T23478] r8:851b2400 r7:838796f0 r6:200000c0 r5:838796c0 r4:85b8e000 [ 7937.163735][T23478] [<814012e4>] (comedi_unlocked_ioctl) from [<80585768>] (sys_ioctl+0x130/0xba0) [ 7937.164186][T23478] r10:851b2400 r9:00000003 r8:85b8e000 r7:200000c0 r6:85b8e001 r5:00000000 [ 7937.164421][T23478] r4:40946400 [ 7937.164535][T23478] [<80585638>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7937.164793][T23478] Exception stack(0xe02f1fa8 to 0xe02f1ff0) [ 7937.164980][T23478] 1fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 7937.165298][T23478] 1fc0: 00000000 00000000 00326310 00000036 00310000 00000000 00006364 76fb80bc [ 7937.165586][T23478] 1fe0: 76fb7ec0 76fb7eb0 000192bc 00132360 [ 7937.165833][T23478] r10:00000036 r9:851b2400 r8:8020029c r7:00000036 r6:00326310 r5:00000000 [ 7937.166119][T23478] r4:00000000 [ 7937.166555][T23478] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 7937.169116][T23478] ---[ end trace 0000000000000000 ]--- [ 7937.275726][T23478] Kernel panic - not syncing: Fatal exception [ 7937.277576][T23478] Rebooting in 86400 seconds.. VM DIAGNOSIS: 15:04:41 Registers: info registers vcpu 0 CPU#0 R00=dddd01c0 R01=5b70c000 R02=00a74805 R03=81ab0880 R04=00000008 R05=828f7f88 R06=00000000 R07=828f7f80 R08=83ed1800 R09=00000028 R10=828f7f88 R11=df801884 R12=df801888 R13=df801878 R14=80340cf8 R15=81ab0890 PSR=600e0193 -ZC- A S svc32 s00=72656820 s01=2d2d2065 d00=2d2d206572656820 s02=616c6374 s03=703d7373 d01=703d7373616c6374 s04=7420745f s05=746e6f63 d02=746e6f637420745f s06=3d747865 s07=74737973 d03=747379733d747865 s08=755f6d65 s09=6a626f3a d04=6a626f3a755f6d65 s10=5f746365 s11=6e753a72 d05=6e753a725f746365 s12=6562616c s13=5f64656c d06=5f64656c6562616c s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=81c05450 R02=00000000 R03=83853ab0 R04=00000000 R05=833b4edc R06=82b11d74 R07=8280cc60 R08=0000397d R09=82af5188 R10=81c05450 R11=df805e8c R12=df805e90 R13=df805e58 R14=81abd97c R15=80d3f4fc PSR=20000113 --C- A S svc32 s00=ec000000 s01=ffffffff d00=ffffffffec000000 s02=e8000000 s03=00042cf6 d01=00042cf6e8000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=ffc76d81 s09=ff95e555 d04=ff95e555ffc76d81 s10=ffffffff s11=ffffffff d05=ffffffffffffffff s12=0026ddb4 s13=ff51ff48 d06=ff51ff480026ddb4 s14=00000000 s15=ffffffff d07=ffffffff00000000 s16=00000000 s17=08062383 d08=0806238300000000 s18=c6000000 s19=fffdc455 d09=fffdc455c6000000 s20=ff54452f s21=ff51ff4b d10=ff51ff4bff54452f s22=ffffffff s23=ffffffff d11=ffffffffffffffff s24=edc76d81 s25=ffffffff d12=ffffffffedc76d81 s26=e8000000 s27=00042cf6 d13=00042cf6e8000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=fecf124f s33=00b59dc7 d16=00b59dc7fecf124f s34=ffffffff s35=00000000 d17=00000000ffffffff s36=fecc5551 s37=ff9525b2 d18=ff9525b2fecc5551 s38=ffffffff s39=ffffffff d19=ffffffffffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=fca680a9 s43=ffffffff d21=fffffffffca680a9 s44=fffffffb s45=ffffffff d22=fffffffffffffffb s46=fee22ae3 s47=ffffffff d23=fffffffffee22ae3 s48=018bddd6 s49=08062383 d24=08062383018bddd6 s50=eac92ed9 s51=ffffffff d25=ffffffffeac92ed9 s52=01bbe341 s53=ff9a2820 d26=ff9a282001bbe341 s54=0140e226 s55=fe0a5054 d27=fe0a50540140e226 s56=ff36cff8 s57=ff659b4c d28=ff659b4cff36cff8 s58=ffb2cda6 s59=0140e226 d29=0140e226ffb2cda6 s60=e141ab98 s61=00042cf6 d30=00042cf6e141ab98 s62=68fe3ea8 s63=ffedd974 d31=ffedd97468fe3ea8 FPSCR: 00000000