last executing test programs: 4m37.676067202s ago: executing program 1 (id=4512): bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000da16c167d803f1f805000600200000000a00060000000000ff0000000000000000001ffeff0001000003f1dc7f7c6e7c0200010000000000004000020000000005000500000000000a"], 0x80}}, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x400008a, 0x0) 4m1.87382517s ago: executing program 1 (id=4532): r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x181140, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)=0x8000000e) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000180)=0x40) r1 = syz_io_uring_setup(0x4b02, &(0x7f0000000580)={0x0, 0x8000, 0x10100, 0x7fffffd, 0x8000002}, &(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0xa3d, 0x0, 0x4c, 0x0, 0x0) 3m59.847464315s ago: executing program 1 (id=4536): r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000000c0)={0x7fff, 0x7, 0xffff}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000000)={0x7fff, 0x6, 0x100}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000080)={0x2, 0x5, 0x3}) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000000c0)={0xdb, 0x1ff, 0xb}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x49, 0x7fff, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000140)={0x9, 0x1002, 0x800}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000380)={0xff, 0x3, 0xd83f}) dup(r2) close_range(r0, 0xffffffffffffffff, 0x0) 3m55.135975032s ago: executing program 1 (id=4537): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000100)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_ADD_RESERVED(r0, 0x3ba0, &(0x7f0000000300)={0x48, 0x1, r1, 0x0, 0x8000001, 0x8ae8}) ioctl$IOMMU_IOAS_IOVA_RANGES(r0, 0x3b84, &(0x7f0000000380)={0x20, r1, 0x2, 0x0, &(0x7f0000000280)=[{}, {}]}) 3m53.39494041s ago: executing program 1 (id=4542): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x94, 0xfc, 0x0, 0xffff83ae}]}) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000004c0)=ANY=[@ANYBLOB="12010000000000106a05310300000000000109022400010000800009040002010300010009210000000122f80409058103"], 0x0) syz_usb_connect$cdc_ecm(0x6, 0x0, 0x0, 0x0) syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x11, 0x3, 0x10) sendmsg(r1, &(0x7f0000000640)={&(0x7f00000000c0)=@caif=@dgm={0x25, 0xd}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)="de4160634257b2b80df4c3665cdea2de2ba29efc", 0x14}], 0x1, 0x0, 0x0, 0x11000000}, 0x8040) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000340)={0x24, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00220508"], 0x0}, 0x0) syz_usb_connect$hid(0x6, 0x0, 0x0, &(0x7f0000000280)={0xa, &(0x7f00000001c0)={0xa, 0x6, 0x250, 0x4, 0x9, 0x1, 0x8, 0xb}, 0x27, &(0x7f0000000200)={0x5, 0xf, 0x27, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x2, 0x4, 0xe, 0x6}, @ss_container_id={0x14, 0x10, 0x4, 0x1, "b275dac406ae3926dabeaa642a54c42c"}, @generic={0x4, 0x10, 0x3, 'I'}]}, 0x1, [{0x2, &(0x7f0000000500)=@string={0x2}}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) 3m50.426699799s ago: executing program 1 (id=4548): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) ptrace$getregset(0x4205, 0x0, 0x202, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) 3m5.362791521s ago: executing program 32 (id=4548): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) ptrace$getregset(0x4205, 0x0, 0x202, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) 36.463216945s ago: executing program 0 (id=4687): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) 36.268688646s ago: executing program 0 (id=4684): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x11) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x8910, &(0x7f00000002c0)={'syztnl0\x00', 0x0}) 35.939020065s ago: executing program 0 (id=4685): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="b70000008100003bbfa30000000000000703000000feffff720af0fff8ffffff71a4f0ff0000000071105400000000001d400500000000004704000001ed00000f030000000000001d440000000000006b0a00fe000000007313000000000000b5000000000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff31a8fd3c0fd8b7ff831028e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646c0200000000000000020000e35208b0bb0d2cd829e654400e2438ec649dc76128610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda82fc9c4d7ecc7a803bf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714f62ba7a54f0c33d39000d0bfed3a6a59ff616236fd8f2477184bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06fa2e04cfe0649226c697d9e8eaade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00023ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a83469620c6e74e1f46132559c4f8700a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88f15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a920099c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40fc5d2f55ff07c53147de202ce517b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661061173f359e9052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6432399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff26b61aac8aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3ba18a1a2b65079cc1c7bc46dd12305a1ae9dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e26534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ad1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336dfaa6d5d164301190bc2d4c04087729033342045804a28082abc3b4762302a271722fb515f31e0dd115a292f1e68481a62c49d15ea5460a29c60b1058fb7aa9bf4ee3cbe11b03711a15d730646b72d074dab1e8c429339f3460d324c17a4a8bfc7d7eab45bef00664d6dc82300000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000002c0)=r2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)=ANY=[], 0x70) 35.300100731s ago: executing program 0 (id=4686): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r1) mount(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000080)='proc\x00', 0x189, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='map_files\x00') 34.524607595s ago: executing program 0 (id=4688): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1f}]}, @NFT_MSG_NEWSETELEM={0x60, 0xc, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x34, 0x3, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPRESSIONS={0x24, 0xb, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}]}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0xe4}}, 0x0) 24.505618112s ago: executing program 0 (id=4691): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000000), 0x0) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, 0x0, 0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x2000009) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7ffff004) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/softnet_stat\x00') read$FUSE(r3, &(0x7f0000000500)={0x2020}, 0x2020) 960.031276ms ago: executing program 2 (id=4702): r0 = fsopen(&(0x7f0000000140)='debugfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) 750.387798ms ago: executing program 2 (id=4703): r0 = syz_open_dev$dri(0x0, 0x1ff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000200)={0x8000, 0x4, 0x4}) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x1ff, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000700)={0x0, &(0x7f0000000640)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_CURSOR(r0, 0xc01c64a3, &(0x7f0000000040)={0x3, r2, 0x6, 0x7ffffffd, 0xb, 0x1fd, 0x1}) 465.548124ms ago: executing program 2 (id=4704): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newlink={0x48, 0x10, 0x1, 0x70bd28, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4700c}, [@IFLA_IFNAME={0x14, 0x3, 'netdevsim0\x00'}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x80000000, 0x7}}]}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x0) 293.814854ms ago: executing program 2 (id=4705): sched_setscheduler(0x0, 0x1, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@multicast1, 0xfffd, 0x0, 0x4e20, 0x0, 0x2}, {0x0, 0x4, 0x1, 0x0, 0x0, 0x9}, {0x1ff, 0xffffffffe, 0x4053e5, 0x20}, 0x6, 0x1, 0x1, 0x0, 0x1, 0x2}, {{@in=@empty, 0x1, 0x32}, 0xa, @in6=@private0, 0x3502, 0x1, 0x0, 0x0, 0x6, 0xfffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}, 0x9df}, 0x1c) 120.520644ms ago: executing program 2 (id=4706): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000002c0)="03", 0x1, 0x24008844, &(0x7f0000000040)={0xa, 0x2, 0x398, @empty}, 0x1c) 0s ago: executing program 2 (id=4707): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_io_uring_setup(0x82e, &(0x7f0000000300)={0x0, 0x20000000, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r3, 0x16, &(0x7f0000000000)={&(0x7f0000001000)={[{0x0}, {0x0}, {0x0}, {0x0}]}, 0x4}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) syz_io_uring_submit(r4, r5, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x0, r6, 0x0, &(0x7f0000002080)={0x0, 0x0, 0x0}}) io_uring_enter(r3, 0x5b43, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): ype=1400 audit(3609.485:7919): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3097.551107][ T31] audit: type=1400 audit(3609.485:7920): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3097.557131][ T31] audit: type=1400 audit(3609.495:7921): avc: denied { ioctl } for pid=18683 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3097.566365][ T31] audit: type=1400 audit(3609.505:7922): avc: denied { recv } for pid=18683 comm="syz-executor" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3097.566622][ T31] audit: type=1400 audit(3609.505:7923): avc: denied { recv } for pid=18683 comm="syz-executor" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3102.516816][ T31] kauditd_printk_skb: 83 callbacks suppressed [ 3102.517054][ T31] audit: type=1400 audit(3614.455:8007): avc: denied { execmem } for pid=22958 comm="syz.0.4524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3103.698052][ T31] audit: type=1400 audit(3615.635:8008): avc: denied { prog_load } for pid=22958 comm="syz.0.4524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3103.700533][ T31] audit: type=1400 audit(3615.635:8009): avc: denied { bpf } for pid=22958 comm="syz.0.4524" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3103.703625][ T31] audit: type=1400 audit(3615.645:8010): avc: denied { perfmon } for pid=22958 comm="syz.0.4524" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3103.706932][ T31] audit: type=1400 audit(3615.645:8011): avc: denied { perfmon } for pid=22958 comm="syz.0.4524" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3103.709347][ T31] audit: type=1400 audit(3615.645:8012): avc: denied { perfmon } for pid=22958 comm="syz.0.4524" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3103.711787][ T31] audit: type=1400 audit(3615.645:8013): avc: denied { perfmon } for pid=22958 comm="syz.0.4524" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3103.714521][ T31] audit: type=1400 audit(3615.655:8014): avc: denied { perfmon } for pid=22958 comm="syz.0.4524" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3103.717554][ T31] audit: type=1400 audit(3615.655:8015): avc: denied { bpf } for pid=22958 comm="syz.0.4524" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3103.720662][ T31] audit: type=1400 audit(3615.655:8016): avc: denied { bpf } for pid=22958 comm="syz.0.4524" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3109.715539][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 3109.715789][ T31] audit: type=1400 audit(3621.655:8031): avc: denied { read } for pid=22961 comm="syz.0.4525" name="controlC1" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3109.737932][ T31] audit: type=1400 audit(3621.665:8032): avc: denied { read open } for pid=22961 comm="syz.0.4525" path="/dev/snd/controlC1" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3109.738210][ T31] audit: type=1400 audit(3621.665:8033): avc: denied { ioctl } for pid=22961 comm="syz.0.4525" path="/dev/snd/controlC1" dev="devtmpfs" ino=727 ioctlcmd=0x5512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3113.780947][ T31] audit: type=1400 audit(3625.715:8034): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3113.815540][ T31] audit: type=1400 audit(3625.755:8035): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3113.848889][ T31] audit: type=1400 audit(3625.765:8036): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3113.849385][ T31] audit: type=1400 audit(3625.765:8037): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3113.849514][ T31] audit: type=1400 audit(3625.775:8038): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3113.849604][ T31] audit: type=1400 audit(3625.785:8039): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3113.849740][ T31] audit: type=1400 audit(3625.785:8040): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3114.123368][T22966] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4526'. [ 3115.010280][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 3115.010544][ T31] audit: type=1400 audit(3626.945:8100): avc: denied { read } for pid=22973 comm="syz.0.4528" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3115.047742][ T31] audit: type=1400 audit(3626.985:8101): avc: denied { read open } for pid=22973 comm="syz.0.4528" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3115.054531][ T31] audit: type=1400 audit(3626.995:8102): avc: denied { ioctl } for pid=22973 comm="syz.0.4528" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3115.158547][T22974] netlink: 68 bytes leftover after parsing attributes in process `syz.0.4528'. [ 3115.284547][ T31] audit: type=1400 audit(3627.195:8103): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3115.285946][ T31] audit: type=1400 audit(3627.195:8104): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3115.300408][ T31] audit: type=1400 audit(3627.235:8105): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3115.382329][ T31] audit: type=1400 audit(3627.305:8106): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3115.382601][ T31] audit: type=1400 audit(3627.305:8107): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3115.390363][ T31] audit: type=1400 audit(3627.325:8108): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3115.390660][ T31] audit: type=1400 audit(3627.325:8109): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3125.426387][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 3125.426661][ T31] audit: type=1400 audit(3637.365:8125): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3125.426765][ T31] audit: type=1400 audit(3637.365:8126): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3125.438538][ T31] audit: type=1400 audit(3637.375:8127): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3125.444944][ T31] audit: type=1400 audit(3637.385:8128): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3125.445156][ T31] audit: type=1400 audit(3637.385:8129): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3125.453831][ T31] audit: type=1400 audit(3637.385:8130): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3125.454056][ T31] audit: type=1400 audit(3637.395:8131): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3125.465459][ T31] audit: type=1400 audit(3637.405:8132): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3125.465717][ T31] audit: type=1400 audit(3637.405:8133): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3125.550487][ T31] audit: type=1400 audit(3637.485:8134): avc: denied { read write } for pid=18683 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3130.436283][ T31] kauditd_printk_skb: 100 callbacks suppressed [ 3130.436508][ T31] audit: type=1400 audit(3642.375:8235): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3130.446783][ T31] audit: type=1400 audit(3642.385:8236): avc: denied { recv } for pid=18683 comm="syz-executor" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3130.484686][ T31] audit: type=1400 audit(3642.425:8237): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3130.486711][ T31] audit: type=1400 audit(3642.425:8238): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3130.508443][ T31] audit: type=1400 audit(3642.425:8239): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3130.508870][ T31] audit: type=1400 audit(3642.435:8240): avc: denied { recv } for pid=2910 comm="klogd" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3130.509149][ T31] audit: type=1400 audit(3642.435:8241): avc: denied { recv } for pid=2910 comm="klogd" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3130.509255][ T31] audit: type=1400 audit(3642.445:8242): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3130.509349][ T31] audit: type=1400 audit(3642.445:8243): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3130.825882][ T31] audit: type=1400 audit(3642.765:8244): avc: denied { read write } for pid=19970 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3135.827278][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 3135.827665][ T31] audit: type=1400 audit(3647.765:8278): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3135.834862][ T31] audit: type=1400 audit(3647.775:8279): avc: denied { recv } for pid=2910 comm="klogd" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3135.838036][ T31] audit: type=1400 audit(3647.775:8280): avc: denied { read write } for pid=19970 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3135.843959][ T31] audit: type=1400 audit(3647.785:8281): avc: denied { read write open } for pid=19970 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3135.853250][ T31] audit: type=1400 audit(3647.785:8282): avc: denied { ioctl } for pid=19970 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3135.876526][ T31] audit: type=1400 audit(3647.815:8283): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3135.880356][ T31] audit: type=1400 audit(3647.815:8284): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3135.884454][ T31] audit: type=1400 audit(3647.825:8285): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3135.908545][ T31] audit: type=1400 audit(3647.845:8286): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3135.909056][ T31] audit: type=1400 audit(3647.845:8287): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3136.692844][T23008] sch_tbf: burst 0 is lower than device macvtap0 mtu (1514) ! [ 3137.066399][T23013] netlink: 44 bytes leftover after parsing attributes in process `syz.0.4543'. [ 3137.722531][T21987] usb 2-1: new high-speed USB device number 106 using dummy_hcd [ 3138.063965][T21987] usb 2-1: Using ep0 maxpacket: 16 [ 3138.175587][T21987] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 3138.176968][T21987] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x81 has invalid wMaxPacketSize 0 [ 3138.189388][T21987] usb 2-1: config 0 interface 0 has no altsetting 0 [ 3138.190400][T21987] usb 2-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.00 [ 3138.194648][T21987] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3138.213844][T21987] usb 2-1: config 0 descriptor?? [ 3139.766127][T21987] usbhid 2-1:0.0: can't add hid device: -71 [ 3139.767207][T21987] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 3139.783991][T21987] usb 2-1: USB disconnect, device number 106 [ 3140.912338][ T31] kauditd_printk_skb: 184 callbacks suppressed [ 3140.912690][ T31] audit: type=1400 audit(3652.845:8472): avc: denied { write } for pid=23038 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3140.920882][ T31] audit: type=1400 audit(3652.855:8473): avc: denied { write open } for pid=23038 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3140.944979][ T31] audit: type=1400 audit(3652.885:8474): avc: denied { search } for pid=23038 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3140.948523][ T31] audit: type=1400 audit(3652.885:8475): avc: denied { search } for pid=23038 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3140.956062][ T31] audit: type=1400 audit(3652.895:8476): avc: denied { search } for pid=23038 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3140.963505][ T31] audit: type=1400 audit(3652.905:8477): avc: denied { search } for pid=23038 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3141.017591][ T31] audit: type=1400 audit(3652.955:8478): avc: denied { search } for pid=23041 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3141.020417][ T31] audit: type=1400 audit(3652.955:8479): avc: denied { search } for pid=23041 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3141.029353][ T31] audit: type=1400 audit(3652.965:8480): avc: denied { search } for pid=23041 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3141.035706][ T31] audit: type=1400 audit(3652.975:8481): avc: denied { read } for pid=23041 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3151.890385][ T31] kauditd_printk_skb: 219 callbacks suppressed [ 3151.890597][ T31] audit: type=1400 audit(3663.825:8701): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3151.907424][ T31] audit: type=1400 audit(3663.845:8702): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3151.943491][ T31] audit: type=1400 audit(3663.885:8704): avc: denied { recv } for pid=22533 comm="syz.0.4405" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3151.968879][ T31] audit: type=1400 audit(3663.885:8705): avc: denied { recv } for pid=22533 comm="syz.0.4405" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3151.969326][ T31] audit: type=1400 audit(3663.885:8706): avc: denied { recv } for pid=22533 comm="syz.0.4405" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3151.969639][ T31] audit: type=1400 audit(3663.865:8703): avc: denied { read write } for pid=18683 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3151.969846][ T31] audit: type=1400 audit(3663.895:8707): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3151.970043][ T31] audit: type=1400 audit(3663.895:8708): avc: denied { read write open } for pid=18683 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3151.970243][ T31] audit: type=1400 audit(3663.895:8709): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3151.970446][ T31] audit: type=1400 audit(3663.895:8710): avc: denied { ioctl } for pid=18683 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3156.380482][T23074] netlink: 14 bytes leftover after parsing attributes in process `syz.0.4557'. [ 3160.149797][ T31] kauditd_printk_skb: 127 callbacks suppressed [ 3160.150175][ T31] audit: type=1400 audit(3672.085:8838): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3160.160791][ T31] audit: type=1400 audit(3672.095:8839): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3160.182736][ T31] audit: type=1400 audit(3672.125:8840): avc: denied { read write } for pid=18683 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3160.185004][ T31] audit: type=1400 audit(3672.125:8841): avc: denied { read write open } for pid=18683 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3160.190763][ T31] audit: type=1400 audit(3672.125:8842): avc: denied { ioctl } for pid=18683 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3160.204921][ T31] audit: type=1400 audit(3672.135:8843): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3160.205133][ T31] audit: type=1400 audit(3672.135:8844): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3160.205246][ T31] audit: type=1400 audit(3672.145:8845): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3160.208479][ T31] audit: type=1400 audit(3672.145:8846): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3160.210453][ T31] audit: type=1400 audit(3672.145:8847): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3166.894943][ T31] kauditd_printk_skb: 108 callbacks suppressed [ 3166.896605][ T31] audit: type=1400 audit(3678.835:8956): avc: denied { create } for pid=23126 comm="syz.0.4566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3166.913799][ T31] audit: type=1400 audit(3678.855:8957): avc: denied { allowed } for pid=23126 comm="syz.0.4566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3166.922606][ T31] audit: type=1400 audit(3678.865:8958): avc: denied { sqpoll } for pid=23126 comm="syz.0.4566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3166.925759][ T31] audit: type=1400 audit(3678.865:8959): avc: denied { create } for pid=23126 comm="syz.0.4566" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3166.943258][ T31] audit: type=1400 audit(3678.885:8960): avc: denied { read } for pid=23126 comm="syz.0.4566" name="renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3166.944670][ T31] audit: type=1400 audit(3678.885:8961): avc: denied { read open } for pid=23126 comm="syz.0.4566" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3166.973055][ T31] audit: type=1400 audit(3678.905:8962): avc: denied { read append } for pid=23126 comm="syz.0.4566" name="fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3166.974315][ T31] audit: type=1400 audit(3678.915:8963): avc: denied { read open } for pid=23126 comm="syz.0.4566" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3166.987865][ T31] audit: type=1400 audit(3678.925:8964): avc: denied { ioctl } for pid=23126 comm="syz.0.4566" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 ioctlcmd=0x642e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3170.756111][ T31] audit: type=1400 audit(3682.685:8965): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3172.671170][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 3172.671487][ T31] audit: type=1400 audit(3684.605:8978): avc: denied { read write } for pid=23131 comm="syz.0.4567" name="sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3172.680716][ T31] audit: type=1400 audit(3684.615:8979): avc: denied { read write open } for pid=23131 comm="syz.0.4567" path="/dev/sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3172.713716][ T31] audit: type=1400 audit(3684.655:8980): avc: denied { create } for pid=23131 comm="syz.0.4567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3172.744772][ T31] audit: type=1400 audit(3684.685:8981): avc: denied { write } for pid=23131 comm="syz.0.4567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3176.613017][ T31] audit: type=1400 audit(3688.555:8982): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3176.620095][ T31] audit: type=1400 audit(3688.555:8983): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3176.666635][ T31] audit: type=1400 audit(3688.605:8984): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3176.666897][ T31] audit: type=1400 audit(3688.605:8985): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3176.672519][ T31] audit: type=1400 audit(3688.605:8986): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3176.680202][ T31] audit: type=1400 audit(3688.615:8987): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3176.944123][T23136] netlink: 60 bytes leftover after parsing attributes in process `syz.0.4568'. [ 3176.945448][T23136] netlink: 60 bytes leftover after parsing attributes in process `syz.0.4568'. [ 3177.099173][T23136] netlink: 60 bytes leftover after parsing attributes in process `syz.0.4568'. [ 3177.100031][T23136] netlink: 60 bytes leftover after parsing attributes in process `syz.0.4568'. [ 3177.403344][T23136] netlink: 60 bytes leftover after parsing attributes in process `syz.0.4568'. [ 3177.404965][T23136] netlink: 60 bytes leftover after parsing attributes in process `syz.0.4568'. [ 3178.244648][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 3178.245044][ T31] audit: type=1400 audit(3690.185:9012): avc: denied { create } for pid=23140 comm="syz.0.4569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3178.250977][ T31] audit: type=1400 audit(3690.185:9013): avc: denied { module_request } for pid=23140 comm="syz.0.4569" kmod="net-pf-10-proto-136-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3178.474073][ T31] audit: type=1400 audit(3690.415:9014): avc: denied { module_request } for pid=23140 comm="syz.0.4569" kmod="net-pf-10-proto-136" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3178.677222][ T31] audit: type=1400 audit(3690.615:9015): avc: denied { create } for pid=23140 comm="syz.0.4569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3178.784244][ T31] audit: type=1400 audit(3690.715:9016): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3178.784568][ T31] audit: type=1400 audit(3690.725:9017): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3178.809172][ T31] audit: type=1400 audit(3690.745:9018): avc: denied { read write } for pid=18683 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3178.811358][ T31] audit: type=1400 audit(3690.745:9019): avc: denied { read write open } for pid=18683 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3178.814943][ T31] audit: type=1400 audit(3690.755:9020): avc: denied { ioctl } for pid=18683 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3178.824476][ T31] audit: type=1400 audit(3690.765:9021): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3184.972301][ T31] kauditd_printk_skb: 66 callbacks suppressed [ 3184.972629][ T31] audit: type=1400 audit(3696.905:9088): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3184.980865][ T31] audit: type=1400 audit(3696.915:9089): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3185.011456][ T31] audit: type=1400 audit(3696.945:9090): avc: denied { execute } for pid=23156 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3185.018136][ T31] audit: type=1400 audit(3696.955:9091): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3185.032365][ T31] audit: type=1400 audit(3696.965:9092): avc: denied { execute_no_trans } for pid=23156 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3185.052139][ T31] audit: type=1400 audit(3696.985:9093): avc: denied { execute } for pid=23156 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3185.078083][ T31] audit: type=1400 audit(3697.015:9094): avc: denied { execmem } for pid=23156 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3185.124595][ T31] audit: type=1400 audit(3697.065:9095): avc: denied { read } for pid=23157 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3185.127972][ T31] audit: type=1400 audit(3697.065:9096): avc: denied { read open } for pid=23157 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3185.147540][ T31] audit: type=1400 audit(3697.085:9097): avc: denied { mounton } for pid=23157 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3187.796511][T23237] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4577'. [ 3187.796846][T23237] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4577'. [ 3187.796972][T23237] netlink: 'syz.0.4577': attribute type 18 has an invalid length. [ 3187.797014][T23237] netlink: 'syz.0.4577': attribute type 18 has an invalid length. [ 3188.724552][T23298] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 3189.146249][T23157] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3189.163948][T23157] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3189.971391][T23362] netlink: 'syz.0.4582': attribute type 5 has an invalid length. [ 3189.988020][ T31] kauditd_printk_skb: 145 callbacks suppressed [ 3189.988316][ T31] audit: type=1400 audit(3701.925:9243): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3189.995977][ T31] audit: type=1400 audit(3701.935:9244): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3190.052648][ T31] audit: type=1400 audit(3701.985:9245): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3190.055263][ T31] audit: type=1400 audit(3701.985:9246): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3190.057115][ T31] audit: type=1400 audit(3701.985:9247): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3190.059260][ T31] audit: type=1400 audit(3701.995:9248): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3190.061315][ T31] audit: type=1400 audit(3701.995:9249): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3190.075720][ T31] audit: type=1400 audit(3702.015:9250): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3190.075946][ T31] audit: type=1400 audit(3702.015:9251): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3190.124526][ T31] audit: type=1400 audit(3702.065:9252): avc: denied { read write } for pid=18683 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3190.964751][T23157] hsr_slave_0: entered promiscuous mode [ 3190.965990][T23157] hsr_slave_1: entered promiscuous mode [ 3190.967824][T23157] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3190.969865][T23157] Cannot create hsr debugfs directory [ 3191.410766][T23157] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 3191.426758][T23157] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 3191.443805][T23157] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 3191.460967][T23157] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 3192.704466][T23157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3195.225125][ T31] kauditd_printk_skb: 53 callbacks suppressed [ 3195.225618][ T31] audit: type=1400 audit(3707.165:9306): avc: denied { sys_module } for pid=23157 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3195.238913][ T31] audit: type=1400 audit(3707.175:9307): avc: denied { module_request } for pid=23157 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3195.650552][ T31] audit: type=1400 audit(3707.585:9308): avc: denied { module_request } for pid=23157 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3195.910315][ T31] audit: type=1400 audit(3707.845:9309): avc: denied { sys_module } for pid=23157 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3195.929159][ T31] audit: type=1400 audit(3707.865:9310): avc: denied { module_request } for pid=23157 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3196.121662][ T31] audit: type=1400 audit(3708.055:9311): avc: denied { module_request } for pid=23157 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3196.276562][ T31] audit: type=1400 audit(3708.215:9312): avc: denied { sys_module } for pid=23157 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3196.276786][ T31] audit: type=1400 audit(3708.215:9313): avc: denied { module_request } for pid=23157 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3196.431509][ T31] audit: type=1400 audit(3708.365:9314): avc: denied { module_request } for pid=23157 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3196.566741][ T31] audit: type=1400 audit(3708.505:9315): avc: denied { sys_module } for pid=23157 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3199.098059][T23157] veth0_vlan: entered promiscuous mode [ 3199.170641][T23157] veth1_vlan: entered promiscuous mode [ 3199.354155][T23157] veth0_macvtap: entered promiscuous mode [ 3199.380478][T23157] veth1_macvtap: entered promiscuous mode [ 3199.487274][T23157] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3199.487548][T23157] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3199.488027][T23157] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3199.488081][T23157] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3200.288855][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 3200.289261][ T31] audit: type=1400 audit(3712.225:9359): avc: denied { create } for pid=23525 comm="syz.2.4574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3200.307135][ T31] audit: type=1400 audit(3712.245:9360): avc: denied { bind } for pid=23525 comm="syz.2.4574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3200.337136][ T31] audit: type=1400 audit(3712.275:9361): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3200.351418][ T31] audit: type=1400 audit(3712.285:9362): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3200.402482][ T31] audit: type=1400 audit(3712.335:9363): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3200.402895][ T31] audit: type=1400 audit(3712.335:9364): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3200.403265][ T31] audit: type=1400 audit(3712.335:9365): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3200.403572][ T31] audit: type=1400 audit(3712.345:9366): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3200.406012][ T31] audit: type=1400 audit(3712.345:9367): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3200.417859][ T31] audit: type=1400 audit(3712.355:9368): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3206.326052][ T31] kauditd_printk_skb: 78 callbacks suppressed [ 3206.326493][ T31] audit: type=1400 audit(3718.265:9447): avc: denied { create } for pid=23542 comm="syz.0.4588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3207.265062][ T31] audit: type=1400 audit(3719.205:9448): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3207.265543][ T31] audit: type=1400 audit(3719.205:9449): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3207.277334][ T31] audit: type=1400 audit(3719.215:9450): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3207.277750][ T31] audit: type=1400 audit(3719.215:9451): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3207.277869][ T31] audit: type=1400 audit(3719.215:9452): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3207.305279][ T31] audit: type=1400 audit(3719.245:9453): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3207.306495][ T31] audit: type=1400 audit(3719.245:9454): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3207.326690][ T31] audit: type=1400 audit(3719.265:9455): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3207.329837][ T31] audit: type=1400 audit(3719.265:9456): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3209.345715][T23554] lo: entered allmulticast mode [ 3209.401465][T23553] lo: left allmulticast mode [ 3211.345035][ T31] kauditd_printk_skb: 88 callbacks suppressed [ 3211.345293][ T31] audit: type=1400 audit(3723.285:9545): avc: denied { bind } for pid=23558 comm="syz.0.4594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3211.366447][ T31] audit: type=1400 audit(3723.305:9546): avc: denied { setopt } for pid=23558 comm="syz.0.4594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3211.393123][ T31] audit: type=1400 audit(3723.325:9547): avc: denied { accept } for pid=23558 comm="syz.0.4594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3211.398814][ T31] audit: type=1400 audit(3723.335:9548): avc: denied { write } for pid=23558 comm="syz.0.4594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3211.451650][ T31] audit: type=1400 audit(3723.365:9549): avc: denied { read } for pid=23558 comm="syz.0.4594" path="socket:[55161]" dev="sockfs" ino=55161 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3211.455023][ T31] audit: type=1400 audit(3723.395:9550): avc: denied { read } for pid=23558 comm="syz.0.4594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3211.521447][ T31] audit: type=1400 audit(3723.455:9551): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3211.547055][ T31] audit: type=1400 audit(3723.485:9552): avc: denied { recv } for pid=23548 comm="syz.2.4590" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3211.564763][ T31] audit: type=1400 audit(3723.505:9553): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3211.567033][ T31] audit: type=1400 audit(3723.505:9554): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3213.707607][T23565] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 3213.707607][T23565] The task syz.0.4596 (23565) triggered the difference, watch for misbehavior. [ 3215.878754][T23576] netlink: 'syz.2.4601': attribute type 1 has an invalid length. [ 3216.355033][ T31] kauditd_printk_skb: 120 callbacks suppressed [ 3216.355565][ T31] audit: type=1400 audit(3728.295:9675): avc: denied { connect } for pid=23584 comm="syz.0.4602" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3216.392347][ T31] audit: type=1400 audit(3728.325:9676): avc: denied { name_connect } for pid=23584 comm="syz.0.4602" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 3216.404703][ T31] audit: type=1400 audit(3728.345:9677): avc: denied { recv } for pid=23584 comm="syz.0.4602" saddr=::1 daddr=::1 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3216.436035][ T31] audit: type=1400 audit(3728.375:9678): avc: denied { recv } for pid=23584 comm="syz.0.4602" saddr=::1 daddr=::1 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3216.465603][ T31] audit: type=1400 audit(3728.405:9679): avc: denied { recv } for pid=23584 comm="syz.0.4602" saddr=::1 daddr=::1 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3216.489433][ T31] audit: type=1400 audit(3728.425:9680): avc: denied { recv } for pid=23584 comm="syz.0.4602" saddr=::1 daddr=::1 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3216.510029][ T31] audit: type=1400 audit(3728.445:9681): avc: denied { recv } for pid=23584 comm="syz.0.4602" saddr=::1 daddr=::1 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3216.533854][ T31] audit: type=1400 audit(3728.475:9682): avc: denied { setopt } for pid=23584 comm="syz.0.4602" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3216.537891][ T31] audit: type=1400 audit(3728.475:9683): avc: denied { recv } for pid=23584 comm="syz.0.4602" saddr=::1 daddr=::1 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3216.575651][ T31] audit: type=1400 audit(3728.515:9684): avc: denied { recv } for pid=23584 comm="syz.0.4602" saddr=::1 daddr=::1 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3221.384656][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 3221.384928][ T31] audit: type=1400 audit(3733.325:9743): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3221.403404][ T31] audit: type=1400 audit(3733.345:9744): avc: denied { execute } for pid=23595 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3221.442395][ T31] audit: type=1400 audit(3733.375:9745): avc: denied { execute_no_trans } for pid=23595 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3221.456266][ T31] audit: type=1400 audit(3733.395:9746): avc: denied { execute } for pid=23595 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3221.478697][T22949] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3221.507340][ T31] audit: type=1400 audit(3733.445:9747): avc: denied { execmem } for pid=23595 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3221.518162][T22949] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3221.548693][T22949] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3221.579896][T22949] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3221.589915][ T31] audit: type=1400 audit(3733.525:9748): avc: denied { read } for pid=23596 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3221.594024][ T31] audit: type=1400 audit(3733.535:9749): avc: denied { read open } for pid=23596 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3221.605041][ T31] audit: type=1400 audit(3733.545:9750): avc: denied { mounton } for pid=23596 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3221.709638][ T31] audit: type=1400 audit(3733.645:9751): avc: denied { module_request } for pid=23596 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3221.869965][T22949] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3221.884938][T22949] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3221.889026][T22949] bond0 (unregistering): Released all slaves [ 3221.951606][T22949] hsr_slave_0: left promiscuous mode [ 3221.953931][T22949] hsr_slave_1: left promiscuous mode [ 3221.967170][T22949] veth1_macvtap: left promiscuous mode [ 3221.967842][T22949] veth0_macvtap: left promiscuous mode [ 3221.968389][T22949] veth1_vlan: left promiscuous mode [ 3221.968916][T22949] veth0_vlan: left promiscuous mode [ 3222.014020][ T31] audit: type=1400 audit(3733.945:9752): avc: denied { sys_module } for pid=23596 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3226.585127][ T31] kauditd_printk_skb: 213 callbacks suppressed [ 3226.585379][ T31] audit: type=1400 audit(3738.525:9966): avc: denied { create } for pid=23623 comm="syz.2.4609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 3226.590868][ T31] audit: type=1400 audit(3738.525:9967): avc: denied { module_request } for pid=23623 comm="syz.2.4609" kmod="net-pf-35" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3226.699882][ T31] audit: type=1400 audit(3738.635:9968): avc: denied { module_request } for pid=23596 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3227.055342][ T31] audit: type=1400 audit(3738.995:9969): avc: denied { sys_module } for pid=23596 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3227.057690][ T31] audit: type=1400 audit(3738.995:9970): avc: denied { module_request } for pid=23596 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3227.290495][ T31] audit: type=1400 audit(3739.225:9971): avc: denied { write } for pid=23751 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3227.302713][ T31] audit: type=1400 audit(3739.245:9972): avc: denied { write open } for pid=23751 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3227.616754][ T31] audit: type=1400 audit(3739.555:9973): avc: denied { module_request } for pid=23596 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3227.831023][ T31] audit: type=1400 audit(3739.765:9974): avc: denied { write } for pid=23754 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3227.840017][ T31] audit: type=1400 audit(3739.775:9975): avc: denied { write open } for pid=23754 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3228.386111][T23596] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3228.403199][T23596] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3231.195356][T23596] hsr_slave_0: entered promiscuous mode [ 3231.197389][T23596] hsr_slave_1: entered promiscuous mode [ 3231.747923][ T31] kauditd_printk_skb: 194 callbacks suppressed [ 3231.748241][ T31] audit: type=1400 audit(3743.685:10170): avc: denied { write } for pid=23883 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3231.754723][ T31] audit: type=1400 audit(3743.695:10171): avc: denied { write open } for pid=23883 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3232.165506][ T31] audit: type=1400 audit(3744.105:10172): avc: denied { write } for pid=23917 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3232.166448][ T31] audit: type=1400 audit(3744.105:10173): avc: denied { write open } for pid=23917 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3232.206913][ T31] audit: type=1400 audit(3744.145:10174): avc: denied { search } for pid=23917 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3232.209701][ T31] audit: type=1400 audit(3744.145:10175): avc: denied { search } for pid=23917 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3232.243465][ T31] audit: type=1400 audit(3744.145:10176): avc: denied { search } for pid=23917 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3232.243728][ T31] audit: type=1400 audit(3744.155:10177): avc: denied { search } for pid=23917 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3232.269152][ T31] audit: type=1400 audit(3744.205:10178): avc: denied { search } for pid=23945 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3232.282422][ T31] audit: type=1400 audit(3744.205:10179): avc: denied { search } for pid=23945 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3232.380886][T23596] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 3232.415449][T23596] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 3232.439798][T23596] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 3232.461006][T23596] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 3235.000031][T23596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3236.752501][ T31] kauditd_printk_skb: 337 callbacks suppressed [ 3236.752762][ T31] audit: type=1400 audit(3748.675:10517): avc: denied { getattr } for pid=23983 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3236.760252][ T31] audit: type=1400 audit(3748.695:10518): avc: denied { search } for pid=23983 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3236.771715][ T31] audit: type=1400 audit(3748.705:10519): avc: denied { search } for pid=23983 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3236.772346][ T31] audit: type=1400 audit(3748.705:10520): avc: denied { search } for pid=23983 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3236.772642][ T31] audit: type=1400 audit(3748.705:10521): avc: denied { search } for pid=23983 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3236.783153][ T31] audit: type=1400 audit(3748.715:10522): avc: denied { search } for pid=23983 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3236.783404][ T31] audit: type=1400 audit(3748.715:10523): avc: denied { search } for pid=23983 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3236.783612][ T31] audit: type=1400 audit(3748.715:10524): avc: denied { search } for pid=23983 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3236.783830][ T31] audit: type=1400 audit(3748.715:10525): avc: denied { read } for pid=23983 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3236.802944][ T31] audit: type=1400 audit(3748.735:10526): avc: denied { read open } for pid=23983 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3241.764823][ T31] kauditd_printk_skb: 477 callbacks suppressed [ 3241.765229][ T31] audit: type=1400 audit(3753.705:11004): avc: denied { read open } for pid=24016 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3241.767603][ T31] audit: type=1400 audit(3753.705:11005): avc: denied { getattr } for pid=24016 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3241.789933][ T31] audit: type=1400 audit(3753.725:11006): avc: denied { search } for pid=24016 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3241.797884][ T31] audit: type=1400 audit(3753.735:11007): avc: denied { search } for pid=24016 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3241.805345][ T31] audit: type=1400 audit(3753.745:11008): avc: denied { search } for pid=24016 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3241.818075][ T31] audit: type=1400 audit(3753.755:11009): avc: denied { search } for pid=24016 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3241.891279][ T31] audit: type=1400 audit(3753.825:11010): avc: denied { search } for pid=24012 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3241.912110][ T31] audit: type=1400 audit(3753.845:11011): avc: denied { search } for pid=24012 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3241.927666][ T31] audit: type=1400 audit(3753.865:11012): avc: denied { search } for pid=24012 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3241.957900][ T31] audit: type=1400 audit(3753.895:11013): avc: denied { search } for pid=24012 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3244.263229][T23596] veth0_vlan: entered promiscuous mode [ 3244.328605][T23596] veth1_vlan: entered promiscuous mode [ 3244.590381][T23596] veth0_macvtap: entered promiscuous mode [ 3244.621199][T23596] veth1_macvtap: entered promiscuous mode [ 3244.838354][T23596] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3244.838572][T23596] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3244.838628][T23596] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3244.838716][T23596] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3246.910258][ T31] kauditd_printk_skb: 291 callbacks suppressed [ 3246.910483][ T31] audit: type=1400 audit(3758.845:11305): avc: denied { write } for pid=24037 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3246.913868][ T31] audit: type=1400 audit(3758.855:11306): avc: denied { write open } for pid=24037 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3246.959631][ T31] audit: type=1400 audit(3758.895:11307): avc: denied { search } for pid=24037 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3246.964429][ T31] audit: type=1400 audit(3758.905:11308): avc: denied { search } for pid=24037 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3246.969655][ T31] audit: type=1400 audit(3758.905:11309): avc: denied { search } for pid=24037 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3246.974732][ T31] audit: type=1400 audit(3758.915:11310): avc: denied { search } for pid=24037 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3247.082455][ T31] audit: type=1400 audit(3759.005:11311): avc: denied { search } for pid=24039 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3247.084934][ T31] audit: type=1400 audit(3759.025:11312): avc: denied { search } for pid=24039 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3247.087866][ T31] audit: type=1400 audit(3759.025:11313): avc: denied { search } for pid=24039 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3247.092257][ T31] audit: type=1400 audit(3759.025:11314): avc: denied { read } for pid=24039 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3251.913778][ T31] kauditd_printk_skb: 514 callbacks suppressed [ 3251.914046][ T31] audit: type=1400 audit(3763.855:11829): avc: denied { search } for pid=24065 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3251.922000][ T31] audit: type=1400 audit(3763.855:11830): avc: denied { search } for pid=24065 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3251.922248][ T31] audit: type=1400 audit(3763.855:11831): avc: denied { search } for pid=24065 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3251.922430][ T31] audit: type=1400 audit(3763.855:11832): avc: denied { write search } for pid=24065 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3251.935869][ T31] audit: type=1400 audit(3763.865:11833): avc: denied { add_name search } for pid=24065 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3251.936086][ T31] audit: type=1400 audit(3763.865:11834): avc: denied { create } for pid=24065 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3251.945858][ T31] audit: type=1400 audit(3763.885:11835): avc: denied { write open } for pid=24065 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=114 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3251.960772][ T31] audit: type=1400 audit(3763.895:11836): avc: denied { search } for pid=24065 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3251.972344][ T31] audit: type=1400 audit(3763.905:11837): avc: denied { search } for pid=24065 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3251.972561][ T31] audit: type=1400 audit(3763.905:11838): avc: denied { search } for pid=24065 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3257.476945][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 3257.477190][ T31] audit: type=1400 audit(3769.415:11889): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3257.482569][ T31] audit: type=1400 audit(3769.415:11890): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3257.488384][ T31] audit: type=1400 audit(3769.425:11891): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3257.490123][ T31] audit: type=1400 audit(3769.425:11892): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3257.517881][ T31] audit: type=1400 audit(3769.455:11893): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3257.518273][ T31] audit: type=1400 audit(3769.455:11894): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3257.537512][ T31] audit: type=1400 audit(3769.475:11895): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3257.539599][ T31] audit: type=1400 audit(3769.475:11896): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3257.645338][ T31] audit: type=1400 audit(3769.585:11897): avc: denied { create } for pid=24073 comm="syz.2.4625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3257.649565][ T31] audit: type=1400 audit(3769.585:11898): avc: denied { create } for pid=24073 comm="syz.2.4625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3260.233625][T24092] netlink: 'syz.2.4630': attribute type 13 has an invalid length. [ 3260.647531][T24092] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 3260.647763][T24092] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 3260.651683][T24092] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 3260.651738][T24092] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 3261.045107][T24094] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4628'. [ 3261.047845][T24094] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4628'. [ 3263.156797][ T31] kauditd_printk_skb: 94 callbacks suppressed [ 3263.157034][ T31] audit: type=1400 audit(3775.095:11993): avc: denied { name_bind } for pid=24093 comm="syz.2.4631" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 3263.170498][ T31] audit: type=1400 audit(3775.105:11994): avc: denied { name_bind } for pid=24093 comm="syz.2.4631" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 3265.733071][ T31] audit: type=1400 audit(3777.655:11995): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3265.734282][ T31] audit: type=1400 audit(3777.675:11996): avc: denied { recv } for pid=24093 comm="syz.2.4631" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3265.764336][ T31] audit: type=1400 audit(3777.705:11997): avc: denied { recv } for pid=24093 comm="syz.2.4631" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3265.766100][ T31] audit: type=1400 audit(3777.705:11998): avc: denied { recv } for pid=24093 comm="syz.2.4631" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3265.771188][ T31] audit: type=1400 audit(3777.705:11999): avc: denied { recv } for pid=24093 comm="syz.2.4631" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3265.773531][ T31] audit: type=1400 audit(3777.715:12000): avc: denied { recv } for pid=24093 comm="syz.2.4631" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3265.774635][ T31] audit: type=1400 audit(3777.715:12001): avc: denied { recv } for pid=24093 comm="syz.2.4631" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3265.784825][ T31] audit: type=1400 audit(3777.725:12002): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3269.087665][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 3269.087938][ T31] audit: type=1400 audit(3781.025:12009): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3269.111047][ T31] audit: type=1400 audit(3781.035:12010): avc: denied { recv } for pid=24098 comm="syz.0.4632" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3269.136329][ T31] audit: type=1400 audit(3781.075:12011): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3269.140154][ T31] audit: type=1400 audit(3781.075:12012): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3269.152442][ T31] audit: type=1400 audit(3781.085:12013): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3269.204838][ T31] audit: type=1400 audit(3781.125:12014): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3269.205310][ T31] audit: type=1400 audit(3781.125:12015): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3269.225207][ T31] audit: type=1400 audit(3781.155:12016): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3269.225736][ T31] audit: type=1400 audit(3781.165:12017): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3269.505637][ T31] audit: type=1400 audit(3781.445:12018): avc: denied { append } for pid=24102 comm="syz.2.4633" name="001" dev="devtmpfs" ino=687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3274.716087][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 3274.716426][ T31] audit: type=1400 audit(3786.655:12036): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3274.738828][ T31] audit: type=1400 audit(3786.675:12037): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3274.773525][ T31] audit: type=1400 audit(3786.705:12038): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3274.783457][ T31] audit: type=1400 audit(3786.705:12039): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3274.783734][ T31] audit: type=1400 audit(3786.715:12040): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3274.802461][ T31] audit: type=1400 audit(3786.725:12041): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3274.802791][ T31] audit: type=1400 audit(3786.735:12042): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3274.872354][ T31] audit: type=1400 audit(3786.795:12043): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3274.872741][ T31] audit: type=1400 audit(3786.795:12044): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3274.909754][ T31] audit: type=1400 audit(3786.845:12045): avc: denied { read write } for pid=23596 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3279.724405][ T31] kauditd_printk_skb: 81 callbacks suppressed [ 3279.724844][ T31] audit: type=1400 audit(3791.665:12127): avc: denied { write } for pid=24123 comm="syz.2.4640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3280.056118][ T31] audit: type=1400 audit(3791.985:12128): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3280.056408][ T31] audit: type=1400 audit(3791.995:12129): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3280.098934][ T31] audit: type=1400 audit(3792.035:12130): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3280.099302][ T31] audit: type=1400 audit(3792.035:12131): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3280.099359][ T31] audit: type=1400 audit(3792.035:12132): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3280.108077][ T31] audit: type=1400 audit(3792.045:12133): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3280.108294][ T31] audit: type=1400 audit(3792.045:12134): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3280.120215][ T31] audit: type=1400 audit(3792.055:12135): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3280.120470][ T31] audit: type=1400 audit(3792.055:12136): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3289.441328][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 3289.441558][ T31] audit: type=1400 audit(3801.375:12176): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3289.451398][ T31] audit: type=1400 audit(3801.385:12177): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3289.488596][ T31] audit: type=1400 audit(3801.425:12178): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3289.488830][ T31] audit: type=1400 audit(3801.425:12179): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3289.489042][ T31] audit: type=1400 audit(3801.425:12180): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3289.499730][ T31] audit: type=1400 audit(3801.435:12181): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3289.499818][ T31] audit: type=1400 audit(3801.435:12182): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3289.509545][ T31] audit: type=1400 audit(3801.445:12183): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3289.509783][ T31] audit: type=1400 audit(3801.445:12184): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3289.584504][ T31] audit: type=1400 audit(3801.525:12185): avc: denied { create } for pid=24141 comm="syz.2.4645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3289.590441][T24142] netlink: 16 bytes leftover after parsing attributes in process `syz.2.4645'. [ 3295.817637][ T31] kauditd_printk_skb: 122 callbacks suppressed [ 3295.818043][ T31] audit: type=1400 audit(3807.755:12308): avc: denied { read } for pid=24160 comm="syz.0.4652" name="nvme-fabrics" dev="devtmpfs" ino=663 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3295.820513][ T31] audit: type=1400 audit(3807.755:12309): avc: denied { read open } for pid=24160 comm="syz.0.4652" path="/dev/nvme-fabrics" dev="devtmpfs" ino=663 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3297.463280][ T31] audit: type=1400 audit(3809.405:12310): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3297.469220][ T31] audit: type=1400 audit(3809.405:12311): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3297.515243][ T31] audit: type=1400 audit(3809.455:12312): avc: denied { recv } for pid=23531 comm="syz.2.4585" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3297.517182][ T31] audit: type=1400 audit(3809.455:12313): avc: denied { recv } for pid=23531 comm="syz.2.4585" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3297.523754][ T31] audit: type=1400 audit(3809.455:12314): avc: denied { recv } for pid=23531 comm="syz.2.4585" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3297.533054][ T31] audit: type=1400 audit(3809.465:12315): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3297.533312][ T31] audit: type=1400 audit(3809.475:12316): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3297.579128][ T31] audit: type=1400 audit(3809.515:12317): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3300.886166][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 3300.886547][ T31] audit: type=1400 audit(3812.825:12319): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3300.892636][ T31] audit: type=1400 audit(3812.825:12320): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3300.906541][ T31] audit: type=1400 audit(3812.845:12321): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3300.908850][ T31] audit: type=1400 audit(3812.845:12322): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3300.919010][ T31] audit: type=1400 audit(3812.855:12323): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3300.920917][ T31] audit: type=1400 audit(3812.855:12324): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3300.938573][ T31] audit: type=1400 audit(3812.875:12325): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3300.940537][ T31] audit: type=1400 audit(3812.875:12326): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3300.970003][ T31] audit: type=1400 audit(3812.905:12327): avc: denied { read write } for pid=23596 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3300.982706][ T31] audit: type=1400 audit(3812.905:12328): avc: denied { read write open } for pid=23596 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3301.715450][T24173] netlink: 28 bytes leftover after parsing attributes in process `syz.2.4656'. [ 3306.940379][ T31] kauditd_printk_skb: 51 callbacks suppressed [ 3306.940586][ T31] audit: type=1400 audit(3818.875:12380): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3306.954947][ T31] audit: type=1400 audit(3818.895:12381): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3306.987517][ T31] audit: type=1400 audit(3818.925:12382): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3306.987739][ T31] audit: type=1400 audit(3818.925:12383): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3306.993039][ T31] audit: type=1400 audit(3818.925:12384): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3306.995711][ T31] audit: type=1400 audit(3818.935:12385): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3306.995873][ T31] audit: type=1400 audit(3818.935:12386): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3307.010200][ T31] audit: type=1400 audit(3818.945:12387): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3307.015446][ T31] audit: type=1400 audit(3818.945:12388): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3307.019902][ T31] audit: type=1400 audit(3818.955:12389): avc: denied { read write } for pid=23596 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3307.799450][T24192] sch_tbf: peakrate 2 is lower than or equals to rate 8 ! [ 3312.674312][ T31] kauditd_printk_skb: 92 callbacks suppressed [ 3312.674532][ T31] audit: type=1400 audit(3824.615:12482): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3312.679712][ T31] audit: type=1400 audit(3824.615:12483): avc: denied { unmount } for pid=23157 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3312.698756][ T31] audit: type=1400 audit(3824.635:12484): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3312.732240][ T31] audit: type=1400 audit(3824.665:12485): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3312.732530][ T31] audit: type=1400 audit(3824.665:12486): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3312.732690][ T31] audit: type=1400 audit(3824.665:12487): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3312.737189][ T31] audit: type=1400 audit(3824.675:12488): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3312.737407][ T31] audit: type=1400 audit(3824.675:12489): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3312.752838][ T31] audit: type=1400 audit(3824.695:12490): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3312.754313][ T31] audit: type=1400 audit(3824.695:12491): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3319.727869][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 3319.728084][ T31] audit: type=1400 audit(3831.665:12529): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3319.762104][ T31] audit: type=1400 audit(3831.685:12530): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3319.784330][ T31] audit: type=1400 audit(3831.725:12531): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3319.785985][ T31] audit: type=1400 audit(3831.725:12532): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3319.787695][ T31] audit: type=1400 audit(3831.725:12533): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3319.814757][ T31] audit: type=1400 audit(3831.755:12534): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3319.816033][ T31] audit: type=1400 audit(3831.755:12535): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3319.822310][ T31] audit: type=1400 audit(3831.755:12536): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3319.824280][ T31] audit: type=1400 audit(3831.765:12537): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3319.977498][ T31] audit: type=1400 audit(3831.915:12538): avc: denied { name_bind } for pid=24210 comm="syz.2.4668" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3324.749110][ T31] kauditd_printk_skb: 38 callbacks suppressed [ 3324.749513][ T31] audit: type=1400 audit(3836.685:12577): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3324.775372][ T31] audit: type=1400 audit(3836.715:12578): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3324.805373][ T31] audit: type=1400 audit(3836.745:12579): avc: denied { recv } for pid=2906 comm="syslogd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3324.807185][ T31] audit: type=1400 audit(3836.745:12580): avc: denied { recv } for pid=2906 comm="syslogd" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3324.817762][ T31] audit: type=1400 audit(3836.745:12581): avc: denied { recv } for pid=2906 comm="syslogd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3324.819009][ T31] audit: type=1400 audit(3836.755:12582): avc: denied { recv } for pid=2910 comm="klogd" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3324.820218][ T31] audit: type=1400 audit(3836.755:12583): avc: denied { recv } for pid=2910 comm="klogd" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3324.835875][ T31] audit: type=1400 audit(3836.775:12584): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3324.837072][ T31] audit: type=1400 audit(3836.775:12585): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3324.913574][ T31] audit: type=1400 audit(3836.855:12586): avc: denied { execmem } for pid=24243 comm="syz.2.4672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3329.768405][ T31] kauditd_printk_skb: 117 callbacks suppressed [ 3329.768727][ T31] audit: type=1400 audit(3841.705:12704): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3329.768898][ T31] audit: type=1400 audit(3841.705:12705): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3329.769030][ T31] audit: type=1400 audit(3841.705:12706): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3329.783201][ T31] audit: type=1400 audit(3841.715:12707): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3329.783477][ T31] audit: type=1400 audit(3841.715:12708): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3329.812511][ T31] audit: type=1400 audit(3841.725:12709): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3329.812771][ T31] audit: type=1400 audit(3841.725:12710): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3329.842283][ T31] audit: type=1400 audit(3841.775:12711): avc: denied { read write } for pid=23596 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3329.842539][ T31] audit: type=1400 audit(3841.775:12712): avc: denied { read write open } for pid=23596 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3329.842710][ T31] audit: type=1400 audit(3841.775:12713): avc: denied { ioctl } for pid=23596 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3334.246256][T24285] can0: slcan on ptm0. [ 3334.323159][T24283] can0 (unregistered): slcan off ptm0. [ 3334.776487][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 3334.776726][ T31] audit: type=1400 audit(3846.715:12774): avc: denied { ioctl } for pid=24293 comm="syz.0.4685" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3334.814528][ T31] audit: type=1400 audit(3846.745:12775): avc: denied { create } for pid=24293 comm="syz.0.4685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3334.819843][ T31] audit: type=1400 audit(3846.755:12776): avc: denied { prog_load } for pid=24293 comm="syz.0.4685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3334.830085][ T31] audit: type=1400 audit(3846.765:12777): avc: denied { bpf } for pid=24293 comm="syz.0.4685" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3334.836398][ T31] audit: type=1400 audit(3846.775:12778): avc: denied { perfmon } for pid=24293 comm="syz.0.4685" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3334.853944][ T31] audit: type=1400 audit(3846.795:12779): avc: denied { perfmon } for pid=24293 comm="syz.0.4685" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3334.855670][ T31] audit: type=1400 audit(3846.795:12780): avc: denied { perfmon } for pid=24293 comm="syz.0.4685" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3334.857144][ T31] audit: type=1400 audit(3846.795:12781): avc: denied { perfmon } for pid=24293 comm="syz.0.4685" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3334.873992][ T31] audit: type=1400 audit(3846.815:12782): avc: denied { bpf } for pid=24293 comm="syz.0.4685" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3334.895102][ T31] audit: type=1400 audit(3846.835:12783): avc: denied { bpf } for pid=24293 comm="syz.0.4685" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3334.913540][T24294] syzkaller1: entered promiscuous mode [ 3334.913789][T24294] syzkaller1: entered allmulticast mode [ 3340.384908][ T31] kauditd_printk_skb: 204 callbacks suppressed [ 3340.385249][ T31] audit: type=1400 audit(3852.325:12988): avc: denied { search } for pid=24313 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3340.389327][ T31] audit: type=1400 audit(3852.325:12989): avc: denied { search } for pid=24313 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3340.415188][ T31] audit: type=1400 audit(3852.355:12990): avc: denied { search } for pid=24313 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3340.466172][ T31] audit: type=1400 audit(3852.405:12991): avc: denied { search } for pid=24303 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3340.993728][ T31] audit: type=1400 audit(3852.935:12992): avc: denied { write } for pid=24314 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3340.998227][ T31] audit: type=1400 audit(3852.935:12993): avc: denied { write open } for pid=24314 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3341.059624][ T31] audit: type=1400 audit(3852.995:12994): avc: denied { search } for pid=24314 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3341.060656][ T31] audit: type=1400 audit(3852.995:12995): avc: denied { search } for pid=24314 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3341.076972][ T31] audit: type=1400 audit(3852.995:12996): avc: denied { search } for pid=24314 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3341.103163][ T31] audit: type=1400 audit(3853.045:12997): avc: denied { search } for pid=24314 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3345.454590][ T31] kauditd_printk_skb: 177 callbacks suppressed [ 3345.454779][ T31] audit: type=1400 audit(3857.395:13175): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3345.475386][ T31] audit: type=1400 audit(3857.415:13176): avc: denied { recv } for pid=23157 comm="syz-executor" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3345.504180][ T31] audit: type=1400 audit(3857.445:13177): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3345.506018][ T31] audit: type=1400 audit(3857.445:13178): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3345.507934][ T31] audit: type=1400 audit(3857.445:13179): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3345.523571][ T31] audit: type=1400 audit(3857.455:13180): avc: denied { recv } for pid=23157 comm="syz-executor" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3345.523871][ T31] audit: type=1400 audit(3857.465:13181): avc: denied { recv } for pid=23157 comm="syz-executor" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3345.529879][ T31] audit: type=1400 audit(3857.465:13182): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3345.532419][ T31] audit: type=1400 audit(3857.475:13183): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3345.597378][ T31] audit: type=1400 audit(3857.535:13184): avc: denied { execmem } for pid=24322 comm="syz.2.4690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3352.497230][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 3352.497469][ T31] audit: type=1400 audit(3864.435:13202): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3352.505656][ T31] audit: type=1400 audit(3864.445:13203): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3352.544033][ T31] audit: type=1400 audit(3864.485:13204): avc: denied { recv } for pid=23157 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3352.557849][ T31] audit: type=1400 audit(3864.485:13205): avc: denied { recv } for pid=23157 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3352.558117][ T31] audit: type=1400 audit(3864.485:13206): avc: denied { recv } for pid=23157 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3352.558177][ T31] audit: type=1400 audit(3864.495:13207): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3352.558224][ T31] audit: type=1400 audit(3864.495:13208): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3352.582189][ T31] audit: type=1400 audit(3864.505:13209): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3352.582486][ T31] audit: type=1400 audit(3864.515:13210): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3352.748299][ T31] audit: type=1400 audit(3864.685:13211): avc: denied { create } for pid=24331 comm="syz.2.4692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3359.847182][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 3359.847598][ T31] audit: type=1400 audit(3871.785:13237): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3359.864542][ T31] audit: type=1400 audit(3871.795:13238): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3359.894596][ T31] audit: type=1400 audit(3871.835:13239): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3359.898556][ T31] audit: type=1400 audit(3871.835:13240): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3359.898649][ T31] audit: type=1400 audit(3871.835:13241): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3359.908405][ T31] audit: type=1400 audit(3871.845:13242): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3359.908605][ T31] audit: type=1400 audit(3871.845:13243): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3359.940098][ T31] audit: type=1400 audit(3871.875:13244): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3359.940310][ T31] audit: type=1400 audit(3871.875:13245): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3360.124793][ T31] audit: type=1400 audit(3872.065:13246): avc: denied { create } for pid=24339 comm="syz.2.4695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3368.131561][ T31] kauditd_printk_skb: 63 callbacks suppressed [ 3368.131991][ T31] audit: type=1400 audit(3880.065:13310): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3368.160476][ T31] audit: type=1400 audit(3880.095:13311): avc: denied { recv } for pid=23531 comm="syz.2.4585" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3368.177941][ T31] audit: type=1400 audit(3880.115:13312): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3368.178191][ T31] audit: type=1400 audit(3880.115:13313): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3368.178503][ T31] audit: type=1400 audit(3880.115:13314): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3368.190732][ T31] audit: type=1400 audit(3880.125:13315): avc: denied { recv } for pid=2906 comm="syslogd" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3368.190988][ T31] audit: type=1400 audit(3880.125:13316): avc: denied { recv } for pid=2906 comm="syslogd" saddr=10.0.2.2 src=47536 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3368.209769][ T31] audit: type=1400 audit(3880.145:13317): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50928 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3368.210062][ T31] audit: type=1400 audit(3880.145:13318): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=50928 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3368.307240][ T31] audit: type=1400 audit(3880.245:13319): avc: denied { execmem } for pid=24353 comm="syz.2.4701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3372.367138][T24370] 8<--- cut here --- [ 3372.369756][T24370] Unable to handle kernel NULL pointer dereference at virtual address 0000000e when read [ 3372.370798][T24370] [0000000e] *pgd=85172003, *pmd=e980a003 [ 3372.373743][T24370] Internal error: Oops: 205 [#1] SMP ARM [ 3372.374715][T24370] Modules linked in: [ 3372.375610][T24370] CPU: 1 UID: 0 PID: 24370 Comm: syz.2.4707 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 3372.375925][T24370] Hardware name: ARM-Versatile Express [ 3372.376129][T24370] PC is at io_buffer_select+0x50/0x18c [ 3372.376351][T24370] LR is at xa_load+0x68/0xa4 [ 3372.376506][T24370] pc : [<80889b54>] lr : [<81a4c394>] psr: 20000013 [ 3372.376744][T24370] sp : dfbd5de8 ip : dfbd5da8 fp : dfbd5e04 [ 3372.376952][T24370] r10: 84c46f00 r9 : 00000000 r8 : 80000001 [ 3372.377157][T24370] r7 : dfbd5e20 r6 : 00000000 r5 : 84976900 r4 : 85e6f600 [ 3372.377370][T24370] r3 : 00000001 r2 : 00000000 r1 : 84aef400 r0 : 00000000 [ 3372.377629][T24370] Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 3372.377868][T24370] Control: 30c5387d Table: 84826900 DAC: 00000000 [ 3372.378094][T24370] Register r0 information: NULL pointer [ 3372.378535][T24370] Register r1 information: slab kmalloc-64 start 84aef400 pointer offset 0 size 64 [ 3372.379194][T24370] Register r2 information: NULL pointer [ 3372.379421][T24370] Register r3 information: non-paged memory [ 3372.379678][T24370] Register r4 information: slab io_kiocb start 85e6f600 pointer offset 0 size 192 [ 3372.380023][T24370] Register r5 information: slab kmalloc-2k start 84976800 pointer offset 256 size 2048 [ 3372.380369][T24370] Register r6 information: NULL pointer [ 3372.380551][T24370] Register r7 information: 2-page vmalloc region starting at 0xdfbd4000 allocated at kernel_clone+0xac/0x3e4 [ 3372.380949][T24370] Register r8 information: non-slab/vmalloc memory [ 3372.381179][T24370] Register r9 information: NULL pointer [ 3372.381345][T24370] Register r10 information: slab sock_inode_cache start 84c46f00 pointer offset 0 size 576 [ 3372.381729][T24370] Register r11 information: 2-page vmalloc region starting at 0xdfbd4000 allocated at kernel_clone+0xac/0x3e4 [ 3372.382207][T24370] Register r12 information: 2-page vmalloc region starting at 0xdfbd4000 allocated at kernel_clone+0xac/0x3e4 [ 3372.382603][T24370] Process syz.2.4707 (pid: 24370, stack limit = 0xdfbd4000) [ 3372.382866][T24370] Stack: (0xdfbd5de8 to 0xdfbd6000) [ 3372.383131][T24370] 5de0: 85e6f600 856fb200 00000000 00000040 dfbd5e54 dfbd5e08 [ 3372.383419][T24370] 5e00: 80892e80 80889b10 84976928 000000e8 85ac0000 00000001 01000000 00000000 [ 3372.383659][T24370] 5e20: 00000000 b6c7834a dfbd5e54 85e6f600 81cf0bd4 00000000 00000000 00000000 [ 3372.383891][T24370] 5e40: 80000001 856ed400 dfbd5e7c dfbd5e58 80882304 80892c5c 85e6f600 80000001 [ 3372.384130][T24370] 5e60: 0000000a 81cf0b5c 84b7ccc0 00000000 dfbd5ebc dfbd5e80 80886dd4 808822c4 [ 3372.384380][T24370] 5e80: 00000000 00000000 00000000 81cf0bd4 00000000 84976800 85e6f66c 85e6f600 [ 3372.384626][T24370] 5ea0: 85ac0000 00000000 00000000 856ed400 dfbd5f14 dfbd5ec0 808878ec 80886d98 [ 3372.384870][T24370] 5ec0: 8088e2a8 81a4c338 00000000 00000000 00000001 00000001 81cf0b5c 00000001 [ 3372.385095][T24370] 5ee0: 84976800 b6c7834a 84b7c3c0 00000000 84976800 00005b43 84b7c3c0 00000000 [ 3372.385349][T24370] 5f00: 856ed400 00000000 dfbd5fa4 dfbd5f18 80888394 808876ec ecac8b10 84976840 [ 3372.385623][T24370] 5f20: 00000000 00000000 81a50110 81a4ffe0 dfbd5f54 dfbd5f40 8026b438 8029ce24 [ 3372.385843][T24370] 5f40: dfbd5fb0 40000000 dfbd5f84 dfbd5f58 802229dc 8026b3f4 00000000 8281d05c [ 3372.386074][T24370] 5f60: dfbd5fb0 0014c490 ecac8b10 80222930 00000000 b6c7834a dfbd5fac 00000000 [ 3372.386305][T24370] 5f80: 00000000 002e643c 000001aa 8020029c 856ed400 000001aa 00000000 dfbd5fa8 [ 3372.386540][T24370] 5fa0: 80200060 80888268 00000000 00000000 00000005 00005b43 00000000 00000000 [ 3372.386748][T24370] 5fc0: 00000000 00000000 002e643c 000001aa 002d0000 00000000 00006364 76b0e0bc [ 3372.386968][T24370] 5fe0: 76b0dec0 76b0deb0 0001939c 00131f30 60000010 00000005 00000000 00000000 [ 3372.387198][T24370] Call trace: [ 3372.387376][T24370] [<80889b04>] (io_buffer_select) from [<80892e80>] (io_recvmsg+0x230/0x420) [ 3372.387641][T24370] r7:00000040 r6:00000000 r5:856fb200 r4:85e6f600 [ 3372.387822][T24370] [<80892c50>] (io_recvmsg) from [<80882304>] (__io_issue_sqe+0x4c/0x1c0) [ 3372.388070][T24370] r10:856ed400 r9:80000001 r8:00000000 r7:00000000 r6:00000000 r5:81cf0bd4 [ 3372.388298][T24370] r4:85e6f600 [ 3372.388399][T24370] [<808822b8>] (__io_issue_sqe) from [<80886dd4>] (io_issue_sqe+0x48/0x59c) [ 3372.388761][T24370] r9:00000000 r8:84b7ccc0 r7:81cf0b5c r6:0000000a r5:80000001 r4:85e6f600 [ 3372.389065][T24370] [<80886d8c>] (io_issue_sqe) from [<808878ec>] (io_submit_sqes+0x20c/0x938) [ 3372.389427][T24370] r10:856ed400 r9:00000000 r8:00000000 r7:85ac0000 r6:85e6f600 r5:85e6f66c [ 3372.389756][T24370] r4:84976800 [ 3372.389924][T24370] [<808876e0>] (io_submit_sqes) from [<80888394>] (sys_io_uring_enter+0x138/0x780) [ 3372.390316][T24370] r10:00000000 r9:856ed400 r8:00000000 r7:84b7c3c0 r6:00005b43 r5:84976800 [ 3372.390640][T24370] r4:00000000 [ 3372.390808][T24370] [<8088825c>] (sys_io_uring_enter) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3372.391107][T24370] Exception stack(0xdfbd5fa8 to 0xdfbd5ff0) [ 3372.391341][T24370] 5fa0: 00000000 00000000 00000005 00005b43 00000000 00000000 [ 3372.391664][T24370] 5fc0: 00000000 00000000 002e643c 000001aa 002d0000 00000000 00006364 76b0e0bc [ 3372.392173][T24370] 5fe0: 76b0dec0 76b0deb0 0001939c 00131f30 [ 3372.392568][T24370] r10:000001aa r9:856ed400 r8:8020029c r7:000001aa r6:002e643c r5:00000000 [ 3372.392843][T24370] r4:00000000 [ 3372.393100][T24370] Code: e3130001 0a00002f e5910000 e1d120be (e1d030be) [ 3372.393882][T24370] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 3372.447439][T24370] Kernel panic - not syncing: Fatal exception [ 3372.449728][T24370] Rebooting in 86400 seconds.. VM DIAGNOSIS: 21:45:33 Registers: info registers vcpu 0 CPU#0 R00=82ad4c48 R01=60000113 R02=00000101 R03=83ad0000 R04=82ad4f48 R05=00000000 R06=82ad3f48 R07=0000000a R08=00000014 R09=00000002 R10=00000007 R11=df801644 R12=df801648 R13=df8015d0 R14=0000003b R15=8079b560 PSR=60000113 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84404440 R01=00000064 R02=eb3b1000 R03=eb3b1018 R04=8324d019 R05=84404440 R06=80a62928 R07=8324d029 R08=8282a2b8 R09=00000000 R10=00002692 R11=dfbd5a54 R12=00000002 R13=dfbd5a48 R14=8295b2ec R15=80a62938 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000