last executing test programs: 25m49.456583629s ago: executing program 0 (id=38939): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x80) dup2(r0, r1) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x10008015}, 0xc0) 25m49.207544043s ago: executing program 0 (id=38940): r0 = openat$binder_debug(0xffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) socket$nl_audit(0x10, 0x3, 0x9) write$nci(r0, &(0x7f00000000c0)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x1, 0x3, 0x3, 0x4f, @v={0x5, 0x0, 0x6, 0x0, {0x3, 0x2, "f40d00076277f348"}}}, 0x12) 25m48.452792725s ago: executing program 0 (id=38941): r0 = openat2(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x20a40}, 0x18) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) sendmsg$inet6(r0, &(0x7f0000002d40)={0x0, 0x0, 0x0}, 0x8000) 25m47.590328002s ago: executing program 0 (id=38943): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x50}, 0x0) 25m46.535695501s ago: executing program 0 (id=38945): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x8}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x400, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.allow\x00', 0x63, 0x0) 25m45.006091575s ago: executing program 0 (id=38947): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) close(r0) timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000001c40)) 24m59.857434973s ago: executing program 32 (id=38947): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) close(r0) timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000001c40)) 12m12.60026739s ago: executing program 1 (id=44295): r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = eventfd2(0x0, 0x800) r2 = dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x20008800}, 0x0) 12m12.347310074s ago: executing program 1 (id=44298): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r2 = dup2(r1, r0) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a00)={0x14, 0x0, 0x1, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000c000}, 0x4008000) 12m12.069487649s ago: executing program 1 (id=44300): r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x682843, 0x0) close_range(r0, r0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x0) 12m11.805178233s ago: executing program 1 (id=44301): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, 0x0, 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x276) 12m11.51015375s ago: executing program 1 (id=44302): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$XFS_IOC_FREE_EOFBLOCKS(r1, 0x8080583a, 0x0) 12m11.100948553s ago: executing program 1 (id=44303): r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x22a000, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$P9_RREMOVE(r0, 0x0, 0x0) 12m11.100803453s ago: executing program 33 (id=44303): r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x22a000, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$P9_RREMOVE(r0, 0x0, 0x0) 8m3.217710239s ago: executing program 2 (id=46644): r0 = openat$mice(0xffffff9c, &(0x7f0000000000), 0x200800) close(r0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={&(0x7f00000016c0)={0x14, 0x0, 0x2, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4800) 8m3.026684909s ago: executing program 2 (id=46646): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/sockcreate\x00') close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x40008004) 8m2.896914846s ago: executing program 2 (id=46649): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) sendmsg$NL80211_CMD_GET_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000011}, 0x800) 8m2.726887436s ago: executing program 2 (id=46650): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) 8m2.610557432s ago: executing program 2 (id=46651): r0 = openat$vsock(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) close_range(r0, r0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) getsockname$packet(r0, 0x0, &(0x7f0000000080)) 8m2.402036674s ago: executing program 2 (id=46652): r0 = openat$vcs(0xffffff9c, &(0x7f0000001c80), 0x40040, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x300, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20048000}, 0xc) 8m2.401886964s ago: executing program 34 (id=46652): r0 = openat$vcs(0xffffff9c, &(0x7f0000001c80), 0x40040, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x300, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20048000}, 0xc) 7m21.227629889s ago: executing program 4 (id=46936): r0 = openat$pfkey(0xffffff9c, &(0x7f0000000040), 0xea040, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x48000}, 0x810) 7m21.099893196s ago: executing program 4 (id=46938): r0 = openat$dlm_control(0xffffff9c, &(0x7f0000000740), 0x602a40, 0x0) close$binfmt(r0) socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x58) 7m20.977223863s ago: executing program 4 (id=46940): r0 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x22a000, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20048000}, 0x2404c080) 7m20.83950168s ago: executing program 4 (id=46942): r0 = openat$iommufd(0xffffff9c, &(0x7f0000000000), 0x1a9040, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001040)) write(r0, 0x0, 0x0) 7m20.677579379s ago: executing program 4 (id=46943): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/profiling', 0x22800, 0x3) dup3(r0, r1, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0xc0}, 0x4800) 7m20.553464966s ago: executing program 4 (id=46945): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$FUSE_DEV_IOC_BACKING_CLOSE(r0, 0xe503, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x103) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f00000020c0), 0x413, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 6m34.624238281s ago: executing program 35 (id=46945): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$FUSE_DEV_IOC_BACKING_CLOSE(r0, 0xe503, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x103) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f00000020c0), 0x413, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 1.202744063s ago: executing program 3 (id=50160): r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)) write$P9_RRENAME(r0, 0x0, 0x0) 1.060876941s ago: executing program 3 (id=50162): r0 = openat$selinux_relabel(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = dup(r0) write$binfmt_script(r1, 0x0, 0x0) write$FUSE_CREATE_OPEN(r1, 0x0, 0x0) 945.939318ms ago: executing program 5 (id=50163): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = openat$cgroup_devices(r1, &(0x7f0000000040)='devices.allow\x00', 0x63, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0x5450, 0x0) 849.400653ms ago: executing program 5 (id=50164): r0 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000000), 0x10b001, 0x0) close_range(r0, r0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) write$rfkill(r0, &(0x7f00000000c0)={0x1, 0x8}, 0x8) 849.246933ms ago: executing program 3 (id=50165): r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0x1, 0x28a02) close$binfmt(r0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0x6, 0x301, 0x0, 0x0, {0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 731.20311ms ago: executing program 5 (id=50166): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000300), r1) 623.930045ms ago: executing program 3 (id=50167): r0 = openat$mixer(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$binder_debug(0xffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, 0x0) 518.486981ms ago: executing program 5 (id=50168): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = pidfd_getfd(r1, r1, 0x0) ioctl$SW_SYNC_IOC_INC(r2, 0x40045701, 0x0) 376.886329ms ago: executing program 3 (id=50169): r0 = openat$hwrng(0xffffff9c, &(0x7f0000000000), 0x2089c1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5451, 0x0) 376.75312ms ago: executing program 5 (id=50170): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/crypto\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x2080, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, 0x0) 176.740101ms ago: executing program 3 (id=50171): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x303500, 0x0) close(r0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000003580)={0x0, 0x0, &(0x7f0000003540)={&(0x7f0000002500)={0x10, 0x140d, 0x100, 0x70bd28, 0x25dfdbff}, 0x10}, 0x1, 0x0, 0x0, 0x4000010}, 0x10) 0s ago: executing program 5 (id=50172): r0 = syz_open_dev$mouse(&(0x7f0000000080), 0x0, 0x1) close$binfmt(r0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) getsockname$packet(r0, 0x0, &(0x7f00000000c0)) kernel console output (not intermixed with test programs): rc=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7757.768565][ T28] audit: type=1400 audit(268451660.667:395338): avc: denied { read write } for pid=7307 comm="syz.3.48551" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7757.772381][ T28] audit: type=1400 audit(268451660.667:395339): avc: denied { open } for pid=7307 comm="syz.3.48551" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7757.774482][ T28] audit: type=1400 audit(268451660.667:395340): avc: denied { ioctl } for pid=7307 comm="syz.3.48551" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7757.945998][ T28] audit: type=1400 audit(268451660.787:395341): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7760.447537][ T7326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7326 comm=syz.3.48558 [ 7762.179556][ T7351] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5121 sclass=netlink_route_socket pid=7351 comm=syz.3.48570 [ 7762.713931][ T28] kauditd_printk_skb: 216 callbacks suppressed [ 7762.717054][ T28] audit: type=1400 audit(268451665.617:395558): avc: denied { recv } for pid=7362 comm="syz.5.48577" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7762.717433][ T28] audit: type=1400 audit(268451665.617:395559): avc: denied { recv } for pid=7362 comm="syz.5.48577" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7762.717696][ T28] audit: type=1400 audit(268451665.617:395560): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7762.719478][ T28] audit: type=1400 audit(268451665.617:395561): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7762.722842][ T28] audit: type=1400 audit(268451665.617:395562): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7762.734241][ T28] audit: type=1400 audit(268451665.637:395563): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7762.922936][ T28] audit: type=1400 audit(268451665.817:395564): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7762.924400][ T28] audit: type=1400 audit(268451665.827:395565): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7762.933760][ T28] audit: type=1400 audit(268451665.837:395566): avc: denied { write } for pid=7354 comm="syz.3.48573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7762.965059][ T28] audit: type=1400 audit(268451665.867:395567): avc: denied { recv } for pid=7354 comm="syz.3.48573" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7764.602948][ T7392] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7392 comm=syz.5.48590 [ 7767.844170][ T28] kauditd_printk_skb: 277 callbacks suppressed [ 7767.850935][ T28] audit: type=1400 audit(268451670.747:395845): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7767.855207][ T28] audit: type=1400 audit(268451670.747:395846): avc: denied { recv } for pid=4393 comm="syz-executor" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7767.904268][ T28] audit: type=1400 audit(268451670.797:395847): avc: denied { recv } for pid=4403 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7767.904884][ T28] audit: type=1400 audit(268451670.807:395848): avc: denied { recv } for pid=4403 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7767.912848][ T28] audit: type=1400 audit(268451670.807:395849): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7767.931573][ T28] audit: type=1400 audit(268451670.827:395850): avc: denied { recv } for pid=4403 comm="syz-executor" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7767.960049][ T28] audit: type=1400 audit(268451670.857:395851): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7767.960673][ T28] audit: type=1400 audit(268451670.857:395852): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7768.122955][ T28] audit: type=1400 audit(268451671.017:395853): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7768.127059][ T28] audit: type=1400 audit(268451671.027:395854): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7772.875458][ T28] kauditd_printk_skb: 175 callbacks suppressed [ 7772.875833][ T28] audit: type=1400 audit(268451675.777:396031): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7772.881166][ T28] audit: type=1400 audit(268451675.767:396030): avc: denied { create } for pid=7468 comm="syz.3.48628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7772.887852][ T28] audit: type=1400 audit(268451675.787:396032): avc: denied { write } for pid=7468 comm="syz.3.48628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7772.910867][ T28] audit: type=1400 audit(268451675.797:396033): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7772.913498][ T28] audit: type=1400 audit(268451675.817:396034): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7772.957728][ T28] audit: type=1400 audit(268451675.857:396035): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7772.958429][ T28] audit: type=1400 audit(268451675.857:396036): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7772.983671][ T28] audit: type=1400 audit(268451675.887:396037): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7772.991734][ T28] audit: type=1400 audit(268451675.887:396038): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7772.992747][ T28] audit: type=1400 audit(268451675.887:396039): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7774.317581][ T7506] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1107 sclass=netlink_route_socket pid=7506 comm=syz.5.48647 [ 7774.603480][ T7512] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7512 comm=syz.3.48649 [ 7777.888532][ T28] kauditd_printk_skb: 400 callbacks suppressed [ 7777.889006][ T28] audit: type=1400 audit(268451680.787:396440): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7777.889228][ T28] audit: type=1400 audit(268451680.787:396441): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7777.953324][ T28] audit: type=1400 audit(268451680.857:396442): avc: denied { create } for pid=7602 comm="syz.5.48695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7777.964875][ T28] audit: type=1400 audit(268451680.867:396443): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7777.970900][ T28] audit: type=1400 audit(268451680.867:396444): avc: denied { recv } for pid=2903 comm="klogd" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7778.005665][ T28] audit: type=1400 audit(268451680.907:396445): avc: denied { write } for pid=7602 comm="syz.5.48695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7778.009179][ T28] audit: type=1400 audit(268451680.907:396446): avc: denied { recv } for pid=2811 comm="pr/ttyAMA-1" saddr=fe80::2 daddr=ff02::1 netif=eth0 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7778.017605][ T28] audit: type=1400 audit(268451680.917:396447): avc: denied { recv } for pid=15923 comm="kworker/u8:1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7778.017996][ T28] audit: type=1400 audit(268451680.917:396448): avc: denied { recv } for pid=15923 comm="kworker/u8:1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7778.025344][ T28] audit: type=1400 audit(268451680.917:396449): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7779.661953][ T7641] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7641 comm=syz.5.48711 [ 7782.947237][ T28] kauditd_printk_skb: 482 callbacks suppressed [ 7782.947616][ T28] audit: type=1400 audit(268451685.847:396932): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7782.954527][ T28] audit: type=1400 audit(268451685.857:396933): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7782.995566][ T28] audit: type=1400 audit(268451685.897:396934): avc: denied { recv } for pid=0 comm="swapper/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7782.997227][ T28] audit: type=1400 audit(268451685.897:396935): avc: denied { recv } for pid=0 comm="swapper/0" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.006158][ T28] audit: type=1400 audit(268451685.907:396936): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.016108][ T28] audit: type=1400 audit(268451685.917:396937): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.039199][ T28] audit: type=1400 audit(268451685.937:396938): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.039638][ T28] audit: type=1400 audit(268451685.937:396939): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.089921][ T28] audit: type=1400 audit(268451685.987:396940): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7783.099748][ T28] audit: type=1400 audit(268451685.997:396941): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7785.429889][ T7733] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7733 comm=syz.5.48756 [ 7786.422490][ T7757] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7757 comm=syz.5.48769 [ 7787.026552][ T7777] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7777 comm=syz.3.48779 [ 7787.347185][ T7785] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7785 comm=syz.3.48783 [ 7787.662821][ T7792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7792 comm=syz.3.48786 [ 7788.004291][ T28] kauditd_printk_skb: 338 callbacks suppressed [ 7788.004663][ T28] audit: type=1400 audit(268451690.897:397280): avc: denied { create } for pid=7797 comm="syz.5.48789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 7788.041355][ T28] audit: type=1400 audit(268451690.937:397281): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7788.041774][ T28] audit: type=1400 audit(268451690.937:397282): avc: denied { recv } for pid=4403 comm="syz-executor" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7788.099669][ T28] audit: type=1400 audit(268451690.987:397283): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7788.102064][ T28] audit: type=1400 audit(268451690.987:397284): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7788.103883][ T28] audit: type=1400 audit(268451690.987:397285): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7788.105544][ T28] audit: type=1400 audit(268451690.997:397286): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7788.112760][ T28] audit: type=1400 audit(268451691.007:397287): avc: denied { recv } for pid=7800 comm="syz.5.48791" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7788.121778][ T28] audit: type=1400 audit(268451691.017:397288): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7788.123997][ T28] audit: type=1400 audit(268451691.017:397289): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7790.120670][ T7837] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7837 comm=syz.5.48809 [ 7793.016168][ T28] kauditd_printk_skb: 428 callbacks suppressed [ 7793.019403][ T28] audit: type=1400 audit(268451695.917:397718): avc: denied { recv } for pid=7910 comm="syz.5.48846" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7793.025809][ T28] audit: type=1400 audit(268451695.927:397719): avc: denied { create } for pid=7910 comm="syz.5.48846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7793.031566][ T28] audit: type=1400 audit(268451695.927:397720): avc: denied { write } for pid=7910 comm="syz.5.48846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7793.056385][ T28] audit: type=1400 audit(268451695.957:397721): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7793.056751][ T28] audit: type=1400 audit(268451695.957:397722): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7793.074622][ T28] audit: type=1400 audit(268451695.967:397723): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7793.074990][ T28] audit: type=1400 audit(268451695.967:397724): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7793.081736][ T28] audit: type=1400 audit(268451695.977:397725): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7793.097915][ T28] audit: type=1400 audit(268451695.987:397726): avc: denied { recv } for pid=4403 comm="syz-executor" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7793.098449][ T28] audit: type=1400 audit(268451695.997:397727): avc: denied { recv } for pid=2903 comm="klogd" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7793.455053][ T7921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7921 comm=syz.3.48851 [ 7794.460244][ T7941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7941 comm=syz.5.48860 [ 7795.291491][ T7966] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5136 sclass=netlink_audit_socket pid=7966 comm=syz.3.48873 [ 7796.640204][ T8000] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8000 comm=syz.3.48890 [ 7797.965403][ T8029] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5137 sclass=netlink_audit_socket pid=8029 comm=syz.5.48904 [ 7798.028223][ T28] kauditd_printk_skb: 384 callbacks suppressed [ 7798.028594][ T28] audit: type=1400 audit(268451700.927:398112): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7798.074872][ T28] audit: type=1400 audit(268451700.977:398113): avc: denied { recv } for pid=19348 comm="kworker/0:0" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7798.460169][ T28] audit: type=1400 audit(268451701.347:398114): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7798.463673][ T28] audit: type=1400 audit(268451701.357:398115): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7798.503564][ T28] audit: type=1400 audit(268451701.407:398116): avc: denied { recv } for pid=4403 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7798.505611][ T28] audit: type=1400 audit(268451701.407:398117): avc: denied { recv } for pid=4403 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7798.519899][ T28] audit: type=1400 audit(268451701.407:398118): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7798.523700][ T28] audit: type=1400 audit(268451701.407:398119): avc: denied { recv } for pid=2903 comm="klogd" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7798.529823][ T28] audit: type=1400 audit(268451701.417:398120): avc: denied { recv } for pid=2903 comm="klogd" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7798.533883][ T28] audit: type=1400 audit(268451701.427:398121): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7802.258079][ T8060] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8060 comm=syz.5.48919 [ 7803.036445][ T28] kauditd_printk_skb: 115 callbacks suppressed [ 7803.036930][ T28] audit: type=1400 audit(268451705.937:398237): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7803.037194][ T28] audit: type=1400 audit(268451705.937:398238): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7803.047444][ T28] audit: type=1400 audit(268451705.947:398239): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7803.073378][ T28] audit: type=1400 audit(268451705.957:398240): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7803.122808][ T28] audit: type=1400 audit(268451705.997:398241): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7803.124474][ T28] audit: type=1400 audit(268451706.007:398242): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7803.395737][ T8070] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8070 comm=syz.3.48924 [ 7803.430279][ T28] audit: type=1400 audit(268451706.317:398243): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7803.453105][ T28] audit: type=1400 audit(268451706.317:398244): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7803.456127][ T28] audit: type=1400 audit(268451706.347:398245): avc: denied { recv } for pid=19348 comm="kworker/0:0" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7803.472993][ T28] audit: type=1400 audit(268451706.357:398246): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7804.633079][ T8099] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8099 comm=syz.3.48938 [ 7805.781342][ T8123] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8123 comm=syz.3.48951 [ 7806.207582][ T8132] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8132 comm=syz.3.48955 [ 7808.055082][ T28] kauditd_printk_skb: 369 callbacks suppressed [ 7808.057842][ T28] audit: type=1400 audit(268451966.958:398616): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7808.076586][ T28] audit: type=1400 audit(268451966.978:398617): avc: denied { create } for pid=8175 comm="syz.5.48977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7808.081178][ T28] audit: type=1400 audit(268451966.978:398618): avc: denied { ioctl } for pid=8175 comm="syz.5.48977" path="socket:[365844]" dev="sockfs" ino=365844 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7808.087710][ T8176] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8176 comm=syz.3.48978 [ 7808.095683][ T28] audit: type=1400 audit(268451966.998:398619): avc: denied { bind } for pid=8175 comm="syz.5.48977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7808.098771][ T28] audit: type=1400 audit(268451966.998:398620): avc: denied { write } for pid=8175 comm="syz.5.48977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7808.111886][ T28] audit: type=1400 audit(268451967.008:398621): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7808.118957][ T28] audit: type=1400 audit(268451967.018:398622): avc: denied { recv } for pid=4393 comm="syz-executor" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7808.156271][ T28] audit: type=1400 audit(268451967.058:398623): avc: denied { recv } for pid=4393 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7808.158908][ T28] audit: type=1400 audit(268451967.058:398624): avc: denied { recv } for pid=4393 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7808.160876][ T28] audit: type=1400 audit(268451967.058:398625): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7808.223310][ T8179] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8179 comm=syz.3.48979 [ 7813.154743][ T28] kauditd_printk_skb: 136 callbacks suppressed [ 7813.155071][ T28] audit: type=1400 audit(268451972.048:398762): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7813.161323][ T28] audit: type=1400 audit(268451972.058:398763): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7813.195774][ T28] audit: type=1400 audit(268451972.098:398764): avc: denied { recv } for pid=9807 comm="kworker/1:1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7813.196067][ T28] audit: type=1400 audit(268451972.098:398765): avc: denied { recv } for pid=9807 comm="kworker/1:1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7813.208519][ T28] audit: type=1400 audit(268451972.108:398766): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7813.223629][ T28] audit: type=1400 audit(268451972.118:398767): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7813.239984][ T28] audit: type=1400 audit(268451972.138:398768): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7813.240489][ T28] audit: type=1400 audit(268451972.138:398769): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7813.587467][ T28] audit: type=1400 audit(268451972.488:398770): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7813.587875][ T28] audit: type=1400 audit(268451972.488:398771): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7815.803292][ T8253] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=8253 comm=syz.5.49014 [ 7818.375002][ T28] kauditd_printk_skb: 252 callbacks suppressed [ 7818.375342][ T28] audit: type=1400 audit(268451977.268:399024): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.415399][ T28] audit: type=1400 audit(268451977.318:399025): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.415664][ T28] audit: type=1400 audit(268451977.318:399026): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.419579][ T28] audit: type=1400 audit(268451977.318:399027): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.429674][ T28] audit: type=1400 audit(268451977.328:399028): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.439819][ T28] audit: type=1400 audit(268451977.338:399029): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.440114][ T28] audit: type=1400 audit(268451977.338:399030): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.506633][ T28] audit: type=1400 audit(268451977.408:399031): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.513960][ T28] audit: type=1400 audit(268451977.418:399032): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7818.555872][ T28] audit: type=1400 audit(268451977.458:399033): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7820.533498][ T8323] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5125 sclass=netlink_route_socket pid=8323 comm=syz.3.49046 [ 7824.073174][ T28] kauditd_printk_skb: 227 callbacks suppressed [ 7824.073682][ T28] audit: type=1400 audit(268451982.968:399261): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.080944][ T28] audit: type=1400 audit(268451982.978:399262): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.097365][ T28] audit: type=1400 audit(268451982.998:399263): avc: denied { unmount } for pid=4393 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 7824.136979][ T28] audit: type=1400 audit(268451983.038:399264): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.137447][ T28] audit: type=1400 audit(268451983.038:399265): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.156059][ T28] audit: type=1400 audit(268451983.048:399266): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.166974][ T28] audit: type=1400 audit(268451983.058:399267): avc: denied { recv } for pid=8330 comm="syz.5.49051" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.167364][ T28] audit: type=1400 audit(268451983.058:399268): avc: denied { recv } for pid=8330 comm="syz.5.49051" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.167628][ T28] audit: type=1400 audit(268451983.068:399269): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7824.167820][ T28] audit: type=1400 audit(268451983.068:399270): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.107375][ T28] kauditd_printk_skb: 294 callbacks suppressed [ 7829.107732][ T28] audit: type=1400 audit(268451988.008:399565): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.107981][ T28] audit: type=1400 audit(268451988.008:399566): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.133601][ T28] audit: type=1400 audit(268451988.018:399567): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.140965][ T28] audit: type=1400 audit(268451988.038:399568): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.153086][ T28] audit: type=1400 audit(268451988.048:399569): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.155044][ T28] audit: type=1400 audit(268451988.048:399570): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.261977][ T28] audit: type=1400 audit(268451988.158:399571): avc: denied { read write } for pid=8418 comm="syz.5.49095" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7829.275760][ T28] audit: type=1400 audit(268451988.158:399572): avc: denied { open } for pid=8418 comm="syz.5.49095" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7829.276160][ T28] audit: type=1400 audit(268451988.168:399573): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7829.276367][ T28] audit: type=1400 audit(268451988.178:399574): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7832.706804][ T8467] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8467 comm=syz.3.49117 [ 7834.114813][ T28] kauditd_printk_skb: 256 callbacks suppressed [ 7834.115161][ T28] audit: type=1400 audit(268451993.008:399831): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7834.115387][ T28] audit: type=1400 audit(268451993.018:399832): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7834.127144][ T28] audit: type=1400 audit(268451993.028:399833): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7834.129194][ T28] audit: type=1400 audit(268451993.028:399834): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7834.583153][ T28] audit: type=1400 audit(268451993.488:399835): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7834.589134][ T28] audit: type=1400 audit(268451993.488:399836): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7834.644690][ T28] audit: type=1400 audit(268451993.538:399837): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7834.646569][ T28] audit: type=1400 audit(268451993.538:399838): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7834.648159][ T28] audit: type=1400 audit(268451993.538:399839): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7834.649693][ T28] audit: type=1400 audit(268451993.538:399840): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7835.237825][ T8491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=515 sclass=netlink_route_socket pid=8491 comm=syz.3.49129 [ 7838.286720][ T8537] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8537 comm=syz.3.49151 [ 7839.187544][ T28] kauditd_printk_skb: 271 callbacks suppressed [ 7839.188001][ T28] audit: type=1400 audit(268451998.078:400112): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7839.204361][ T28] audit: type=1400 audit(268451998.108:400113): avc: denied { read } for pid=8549 comm="syz.5.49158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 7839.242068][ T28] audit: type=1400 audit(268451998.138:400114): avc: denied { recv } for pid=4393 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7839.244501][ T28] audit: type=1400 audit(268451998.138:400115): avc: denied { recv } for pid=4393 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7839.250692][ T28] audit: type=1400 audit(268451998.138:400116): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7839.254876][ T28] audit: type=1400 audit(268451998.148:400117): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7839.260410][ T28] audit: type=1400 audit(268451998.148:400118): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7839.269924][ T28] audit: type=1400 audit(268451998.148:400119): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7839.276706][ T28] audit: type=1400 audit(268451998.168:400120): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7839.402836][ T28] audit: type=1400 audit(268451998.298:400121): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7840.861408][ T8582] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8582 comm=syz.5.49174 [ 7843.655948][ T8631] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8631 comm=syz.5.49196 [ 7844.197316][ T28] kauditd_printk_skb: 332 callbacks suppressed [ 7844.197749][ T28] audit: type=1400 audit(268452003.098:400454): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.201445][ T28] audit: type=1400 audit(268452003.098:400455): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.354601][ T28] audit: type=1400 audit(268452003.258:400456): avc: denied { create } for pid=8641 comm="syz.3.49204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 7844.386655][ T28] audit: type=1400 audit(268452003.278:400457): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.388279][ T28] audit: type=1400 audit(268452003.288:400458): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.432877][ T28] audit: type=1400 audit(268452003.328:400459): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.433266][ T28] audit: type=1400 audit(268452003.328:400460): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.433451][ T28] audit: type=1400 audit(268452003.328:400461): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.433572][ T28] audit: type=1400 audit(268452003.328:400462): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.441520][ T28] audit: type=1400 audit(268452003.338:400463): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7844.599023][ T8648] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8648 comm=syz.5.49206 [ 7845.314029][ T8659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1537 sclass=netlink_route_socket pid=8659 comm=syz.3.49212 [ 7845.580718][ T8664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8664 comm=syz.5.49214 [ 7845.937134][ T8672] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8672 comm=syz.3.49219 [ 7846.842012][ T8689] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1016 sclass=netlink_route_socket pid=8689 comm=syz.3.49226 [ 7849.219183][ T28] kauditd_printk_skb: 316 callbacks suppressed [ 7849.219621][ T28] audit: type=1400 audit(268452008.118:400780): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.241039][ T28] audit: type=1400 audit(268452008.138:400781): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.265344][ T28] audit: type=1400 audit(268452008.168:400782): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.267958][ T28] audit: type=1400 audit(268452008.168:400783): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.269896][ T28] audit: type=1400 audit(268452008.168:400784): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.283428][ T28] audit: type=1400 audit(268452008.178:400785): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.288847][ T28] audit: type=1400 audit(268452008.188:400786): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.306772][ T28] audit: type=1400 audit(268452008.208:400787): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7849.394690][ T28] audit: type=1400 audit(268452008.298:400788): avc: denied { read write } for pid=8733 comm="syz.5.49249" name="vcs1" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7849.403522][ T28] audit: type=1400 audit(268452008.308:400789): avc: denied { ioctl open } for pid=8733 comm="syz.5.49249" path="/dev/vcs1" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7849.783217][ T8740] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8740 comm=syz.5.49253 [ 7854.270104][ T28] kauditd_printk_skb: 354 callbacks suppressed [ 7854.270588][ T28] audit: type=1400 audit(268452013.168:401144): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7854.321091][ T28] audit: type=1400 audit(268452013.218:401145): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7854.321616][ T28] audit: type=1400 audit(268452013.218:401146): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7854.321973][ T28] audit: type=1400 audit(268452013.218:401147): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7854.323719][ T28] audit: type=1400 audit(268452013.228:401148): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7854.323853][ T28] audit: type=1400 audit(268452013.228:401149): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7854.329379][ T28] audit: type=1400 audit(268452013.228:401150): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7854.337807][ T28] audit: type=1400 audit(268452013.238:401151): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7854.461166][ T28] audit: type=1400 audit(268452013.358:401152): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7854.469470][ T28] audit: type=1400 audit(268452013.368:401153): avc: denied { recv } for pid=8834 comm="syz.5.49297" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7857.998440][ T8875] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=8875 comm=syz.3.49319 [ 7859.550489][ T28] kauditd_printk_skb: 178 callbacks suppressed [ 7859.550789][ T28] audit: type=1400 audit(268452018.448:401332): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7859.570450][ T28] audit: type=1400 audit(268452018.468:401333): avc: denied { recv } for pid=26191 comm="kworker/0:2" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7859.603628][ T28] audit: type=1400 audit(268452018.508:401334): avc: denied { recv } for pid=8882 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7859.605071][ T28] audit: type=1400 audit(268452018.508:401335): avc: denied { recv } for pid=8882 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7859.623862][ T28] audit: type=1400 audit(268452018.528:401336): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7859.636890][ T28] audit: type=1400 audit(268452018.538:401337): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7859.653319][ T28] audit: type=1400 audit(268452018.548:401338): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7859.656260][ T28] audit: type=1400 audit(268452018.558:401339): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7859.689898][ T28] audit: type=1400 audit(268452018.578:401340): avc: denied { execmem } for pid=8882 comm="syz.3.49323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 7859.690486][ T28] audit: type=1400 audit(268452018.588:401341): avc: denied { read } for pid=8882 comm="syz.3.49323" dev="nsfs" ino=4026532726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7861.255528][ T8892] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8892 comm=syz.5.49327 [ 7864.057368][ T8938] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8938 comm=syz.3.49350 [ 7864.555535][ T28] kauditd_printk_skb: 239 callbacks suppressed [ 7864.555961][ T28] audit: type=1400 audit(268452023.448:401581): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7864.589531][ T28] audit: type=1400 audit(268452023.488:401582): avc: denied { create } for pid=8945 comm="syz.5.49353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7864.595712][ T28] audit: type=1400 audit(268452023.498:401583): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7864.596023][ T28] audit: type=1400 audit(268452023.498:401584): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7864.599995][ T28] audit: type=1400 audit(268452023.498:401585): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7864.607876][ T28] audit: type=1400 audit(268452023.508:401586): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7864.608380][ T28] audit: type=1400 audit(268452023.508:401587): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7864.629835][ T28] audit: type=1400 audit(268452023.528:401588): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7864.630285][ T28] audit: type=1400 audit(268452023.528:401589): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7864.649908][ T28] audit: type=1400 audit(268452023.548:401590): avc: denied { ioctl } for pid=8945 comm="syz.5.49353" path="socket:[368218]" dev="sockfs" ino=368218 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7869.600633][ T28] kauditd_printk_skb: 343 callbacks suppressed [ 7869.601032][ T28] audit: type=1400 audit(268452028.498:401934): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.611129][ T28] audit: type=1400 audit(268452028.508:401935): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.645830][ T28] audit: type=1400 audit(268452028.548:401936): avc: denied { recv } for pid=4393 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.646130][ T28] audit: type=1400 audit(268452028.548:401937): avc: denied { recv } for pid=4393 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.656819][ T28] audit: type=1400 audit(268452028.558:401938): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.679993][ T28] audit: type=1400 audit(268452028.578:401939): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.681024][ T28] audit: type=1400 audit(268452028.578:401940): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.709036][ T28] audit: type=1400 audit(268452028.608:401941): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.723369][ T28] audit: type=1400 audit(268452028.628:401942): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7869.773625][ T28] audit: type=1400 audit(268452028.678:401943): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7873.839295][ T9106] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9106 comm=syz.3.49433 [ 7874.636862][ T28] kauditd_printk_skb: 316 callbacks suppressed [ 7874.641903][ T28] audit: type=1400 audit(268452033.538:402260): avc: denied { read } for pid=9119 comm="syz.5.49440" name="vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7874.644917][ T28] audit: type=1400 audit(268452033.538:402261): avc: denied { open } for pid=9119 comm="syz.5.49440" path="/dev/vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7874.670967][ T28] audit: type=1400 audit(268452033.568:402262): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7874.671522][ T28] audit: type=1400 audit(268452033.568:402263): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7874.716586][ T28] audit: type=1400 audit(268452033.618:402264): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7874.717079][ T28] audit: type=1400 audit(268452033.618:402265): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7874.731690][ T28] audit: type=1400 audit(268452033.618:402266): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7874.766480][ T28] audit: type=1400 audit(268452033.668:402267): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7874.773820][ T28] audit: type=1400 audit(268452033.668:402268): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7874.787562][ T28] audit: type=1400 audit(268452033.678:402269): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7879.054775][ T9183] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65525 sclass=netlink_route_socket pid=9183 comm=syz.5.49470 [ 7879.658487][ T28] kauditd_printk_skb: 273 callbacks suppressed [ 7879.665900][ T28] audit: type=1400 audit(268452038.558:402543): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7879.678424][ T28] audit: type=1400 audit(268452038.578:402544): avc: denied { recv } for pid=9196 comm="syz.3.49477" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7879.706046][ T28] audit: type=1400 audit(268452038.608:402545): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7879.706509][ T28] audit: type=1400 audit(268452038.608:402546): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7879.723861][ T28] audit: type=1400 audit(268452038.618:402547): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7879.755587][ T28] audit: type=1400 audit(268452038.638:402548): avc: denied { recv } for pid=4393 comm="syz-executor" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7879.757863][ T28] audit: type=1400 audit(268452038.648:402549): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7879.759819][ T28] audit: type=1400 audit(268452038.648:402550): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7879.761790][ T28] audit: type=1400 audit(268452038.648:402551): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7879.791902][ T28] audit: type=1400 audit(268452038.688:402552): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7880.003606][ T9202] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=9202 comm=syz.3.49480 [ 7884.663474][ T28] kauditd_printk_skb: 309 callbacks suppressed [ 7884.668030][ T28] audit: type=1400 audit(268452043.568:402862): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7884.680224][ T28] audit: type=1400 audit(268452043.578:402863): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7884.702969][ T28] audit: type=1400 audit(268452043.588:402864): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7884.710856][ T28] audit: type=1400 audit(268452043.598:402865): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7884.711024][ T28] audit: type=1400 audit(268452043.598:402866): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7884.711106][ T28] audit: type=1400 audit(268452043.608:402867): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7884.785153][ T28] audit: type=1400 audit(268452043.688:402868): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7884.800254][ T28] audit: type=1400 audit(268452043.698:402869): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7884.838009][ T28] audit: type=1400 audit(268452043.738:402870): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7884.838534][ T28] audit: type=1400 audit(268452043.738:402871): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7886.548962][ T9307] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9307 comm=syz.3.49531 [ 7887.577810][ T9323] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9323 comm=syz.5.49539 [ 7887.774987][ T9326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=9326 comm=syz.3.49540 [ 7889.705165][ T28] kauditd_printk_skb: 338 callbacks suppressed [ 7889.705551][ T28] audit: type=1400 audit(268452048.608:403210): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7889.705818][ T28] audit: type=1400 audit(268452048.608:403211): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7889.726114][ T28] audit: type=1400 audit(268452048.628:403212): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7889.740579][ T28] audit: type=1400 audit(268452048.638:403213): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7889.741169][ T28] audit: type=1400 audit(268452048.638:403214): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7889.769480][ T28] audit: type=1400 audit(268452048.668:403215): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7889.774686][ T28] audit: type=1400 audit(268452048.678:403216): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7889.813131][ T28] audit: type=1400 audit(268452048.708:403217): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7889.820469][ T28] audit: type=1400 audit(268452048.718:403218): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7889.836921][ T28] audit: type=1400 audit(268452048.738:403219): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7892.714276][ T9407] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9407 comm=syz.5.49580 [ 7893.268934][ T9417] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9417 comm=syz.3.49585 [ 7894.749417][ T28] kauditd_printk_skb: 318 callbacks suppressed [ 7894.749624][ T28] audit: type=1400 audit(268452053.648:403538): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7894.759026][ T28] audit: type=1400 audit(268452053.658:403539): avc: denied { write } for pid=9446 comm="syz.5.49600" name="psched" dev="proc" ino=4026532882 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 7894.766892][ T28] audit: type=1400 audit(268452053.668:403540): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7894.779905][ T28] audit: type=1400 audit(268452053.668:403541): avc: denied { write } for pid=9446 comm="syz.5.49600" path="/proc/2456/net/psched" dev="proc" ino=4026532882 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 7894.805810][ T28] audit: type=1400 audit(268452053.698:403542): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7894.806414][ T28] audit: type=1400 audit(268452053.698:403543): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7894.806752][ T28] audit: type=1400 audit(268452053.698:403544): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7894.806974][ T28] audit: type=1400 audit(268452053.708:403545): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7894.821129][ T28] audit: type=1400 audit(268452053.708:403546): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7894.834566][ T28] audit: type=1400 audit(268452053.728:403547): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7897.333779][ T9497] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9497 comm=syz.5.49625 [ 7898.238909][ T9512] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9512 comm=syz.5.49631 [ 7898.729513][ T9521] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9521 comm=syz.3.49637 [ 7899.752915][ T28] kauditd_printk_skb: 321 callbacks suppressed [ 7899.753483][ T28] audit: type=1400 audit(268452058.648:403869): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7899.796086][ T28] audit: type=1400 audit(268452058.698:403870): avc: denied { recv } for pid=4403 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7899.807976][ T28] audit: type=1400 audit(268452058.698:403871): avc: denied { recv } for pid=4403 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7899.815130][ T28] audit: type=1400 audit(268452058.718:403872): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7899.833235][ T28] audit: type=1400 audit(268452058.728:403873): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7899.837445][ T28] audit: type=1400 audit(268452058.728:403874): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7899.850076][ T28] audit: type=1400 audit(268452058.748:403875): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7899.863519][ T28] audit: type=1400 audit(268452058.748:403876): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7899.984907][ T28] audit: type=1400 audit(268452058.888:403877): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7899.994129][ T28] audit: type=1400 audit(268452058.898:403878): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7901.125048][ T9548] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9548 comm=syz.5.49648 [ 7904.735654][ T9613] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9613 comm=syz.3.49683 [ 7904.776420][ T28] kauditd_printk_skb: 304 callbacks suppressed [ 7904.776819][ T28] audit: type=1400 audit(268452063.678:404183): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7904.797005][ T28] audit: type=1400 audit(268452063.698:404184): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7904.836981][ T28] audit: type=1400 audit(268452063.728:404185): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7904.837465][ T28] audit: type=1400 audit(268452063.728:404186): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7904.837802][ T28] audit: type=1400 audit(268452063.728:404187): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7904.838017][ T28] audit: type=1400 audit(268452063.738:404188): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7904.838228][ T28] audit: type=1400 audit(268452063.738:404189): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7904.881021][ T28] audit: type=1400 audit(268452063.768:404190): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7904.885719][ T28] audit: type=1400 audit(268452063.778:404191): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7904.932745][ T28] audit: type=1400 audit(268452063.828:404192): avc: denied { read } for pid=9614 comm="syz.5.49681" dev="nsfs" ino=4026532862 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7909.026054][ T9686] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9686 comm=syz.3.49718 [ 7909.798142][ T28] kauditd_printk_skb: 319 callbacks suppressed [ 7909.798604][ T28] audit: type=1400 audit(268452068.698:404512): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7909.809637][ T28] audit: type=1400 audit(268452068.708:404513): avc: denied { recv } for pid=2899 comm="syslogd" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7909.853338][ T28] audit: type=1400 audit(268452068.748:404515): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7909.853934][ T28] audit: type=1400 audit(268452068.748:404516): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7909.854059][ T28] audit: type=1400 audit(268452068.738:404514): avc: denied { create } for pid=9700 comm="syz.3.49726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 7909.854155][ T28] audit: type=1400 audit(268452068.748:404517): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7909.854242][ T28] audit: type=1400 audit(268452068.748:404518): avc: denied { write } for pid=9700 comm="syz.3.49726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 7909.859415][ T28] audit: type=1400 audit(268452068.758:404519): avc: denied { recv } for pid=2811 comm="pr/ttyAMA-1" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7909.877299][ T28] audit: type=1400 audit(268452068.768:404520): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7909.916147][ T28] audit: type=1400 audit(268452068.818:404521): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7914.895454][ T28] kauditd_printk_skb: 296 callbacks suppressed [ 7914.895788][ T28] audit: type=1400 audit(268452073.798:404818): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7914.910558][ T28] audit: type=1400 audit(268452073.808:404819): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7914.964982][ T28] audit: type=1400 audit(268452073.858:404820): avc: denied { recv } for pid=4393 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7914.967376][ T28] audit: type=1400 audit(268452073.858:404821): avc: denied { recv } for pid=4393 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7914.975602][ T28] audit: type=1400 audit(268452073.858:404822): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7914.979356][ T28] audit: type=1400 audit(268452073.868:404823): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7914.996729][ T28] audit: type=1400 audit(268452073.888:404824): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7914.999242][ T28] audit: type=1400 audit(268452073.898:404825): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7915.077962][ T28] audit: type=1400 audit(268452073.978:404826): avc: denied { create } for pid=9774 comm="syz.3.49762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7915.098954][ T28] audit: type=1400 audit(268452073.998:404827): avc: denied { ioctl } for pid=9774 comm="syz.3.49762" path="socket:[372751]" dev="sockfs" ino=372751 ioctlcmd=0x891c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7919.937726][ T28] kauditd_printk_skb: 280 callbacks suppressed [ 7919.938086][ T28] audit: type=1400 audit(268452078.838:405108): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7919.938361][ T28] audit: type=1400 audit(268452078.838:405109): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7919.942952][ T28] audit: type=1400 audit(268452078.838:405110): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7919.949349][ T28] audit: type=1400 audit(268452078.848:405111): avc: denied { recv } for pid=2903 comm="klogd" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7919.957058][ T28] audit: type=1400 audit(268452078.858:405112): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7920.005494][ T28] audit: type=1400 audit(268452078.908:405113): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7920.186117][ T9845] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9845 comm=syz.3.49797 [ 7920.242925][ T28] audit: type=1400 audit(268452079.138:405114): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7920.254239][ T28] audit: type=1400 audit(268452079.148:405115): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7920.285606][ T28] audit: type=1400 audit(268452079.188:405116): avc: denied { recv } for pid=4403 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7920.293773][ T28] audit: type=1400 audit(268452079.188:405117): avc: denied { recv } for pid=4403 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7924.944067][ T28] kauditd_printk_skb: 176 callbacks suppressed [ 7924.944549][ T28] audit: type=1400 audit(268452083.848:405294): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7924.965099][ T28] audit: type=1400 audit(268452083.868:405295): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7924.970481][ T28] audit: type=1400 audit(268452083.868:405296): avc: denied { write } for pid=9887 comm="syz.5.49817" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7924.987734][ T28] audit: type=1400 audit(268452083.888:405297): avc: denied { write open } for pid=9887 comm="syz.5.49817" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7925.014713][ T28] audit: type=1400 audit(268452083.898:405298): avc: denied { recv } for pid=2899 comm="syslogd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7925.015557][ T28] audit: type=1400 audit(268452083.898:405299): avc: denied { recv } for pid=2899 comm="syslogd" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7925.015778][ T28] audit: type=1400 audit(268452083.898:405300): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7925.015984][ T28] audit: type=1400 audit(268452083.908:405301): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7925.016185][ T28] audit: type=1400 audit(268452083.918:405302): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7925.016411][ T28] audit: type=1400 audit(268452083.918:405303): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7929.485190][ T9972] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9972 comm=syz.3.49859 [ 7930.101196][ T28] kauditd_printk_skb: 354 callbacks suppressed [ 7930.101558][ T28] audit: type=1400 audit(268452088.998:405658): avc: denied { create } for pid=9982 comm="syz.3.49864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7930.135278][ T28] audit: type=1400 audit(268452089.038:405659): avc: denied { write } for pid=9982 comm="syz.3.49864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7930.157048][ T28] audit: type=1400 audit(268452089.058:405660): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7930.164592][ T28] audit: type=1400 audit(268452089.068:405661): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7930.204849][ T28] audit: type=1400 audit(268452089.108:405662): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7930.207056][ T28] audit: type=1400 audit(268452089.108:405663): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7930.210649][ T28] audit: type=1400 audit(268452089.108:405664): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7930.220486][ T28] audit: type=1400 audit(268452089.118:405665): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7930.223097][ T28] audit: type=1400 audit(268452089.118:405666): avc: denied { recv } for pid=8247 comm="syz.5.49011" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7930.230142][ T28] audit: type=1400 audit(268452089.128:405667): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7930.451046][ T9986] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=381 sclass=netlink_route_socket pid=9986 comm=syz.3.49866 [ 7933.064750][T10024] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10024 comm=syz.3.49884 [ 7935.188743][ T28] kauditd_printk_skb: 283 callbacks suppressed [ 7935.189171][ T28] audit: type=1400 audit(268452094.088:405951): avc: denied { create } for pid=10051 comm="syz.3.49899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7935.218144][ T28] audit: type=1400 audit(268452094.118:405952): avc: denied { write } for pid=10051 comm="syz.3.49899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7935.434878][ T28] audit: type=1400 audit(268452094.318:405953): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7935.435335][ T28] audit: type=1400 audit(268452094.338:405954): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7935.467214][ T28] audit: type=1400 audit(268452094.368:405955): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7935.493965][ T28] audit: type=1400 audit(268452094.398:405956): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7935.593257][ T28] audit: type=1400 audit(268452094.488:405957): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7935.608631][ T28] audit: type=1400 audit(268452094.498:405958): avc: denied { recv } for pid=26718 comm="kworker/u8:0" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7935.609184][ T28] audit: type=1400 audit(268452094.498:405959): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7935.609592][ T28] audit: type=1400 audit(268452094.498:405960): avc: denied { recv } for pid=26718 comm="kworker/u8:0" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7937.548774][T10082] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=10082 comm=syz.5.49913 [ 7940.206333][ T28] kauditd_printk_skb: 326 callbacks suppressed [ 7940.206729][ T28] audit: type=1400 audit(268452099.108:406287): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7940.209429][ T28] audit: type=1400 audit(268452099.108:406288): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7940.211336][ T28] audit: type=1400 audit(268452099.108:406289): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7940.219460][ T28] audit: type=1400 audit(268452099.118:406290): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7940.231317][ T28] audit: type=1400 audit(268452099.128:406291): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7940.274687][ T28] audit: type=1400 audit(268452099.178:406292): avc: denied { recv } for pid=10133 comm="syz.5.49939" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7940.276125][ T28] audit: type=1400 audit(268452099.178:406293): avc: denied { create } for pid=10133 comm="syz.5.49939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7940.281171][ T28] audit: type=1400 audit(268452099.178:406294): avc: denied { write } for pid=10133 comm="syz.5.49939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7940.333981][ T28] audit: type=1400 audit(268452099.218:406295): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7940.334650][ T28] audit: type=1400 audit(268452099.228:406296): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7945.296306][ T28] kauditd_printk_skb: 227 callbacks suppressed [ 7945.296728][ T28] audit: type=1400 audit(268452104.198:406524): avc: denied { write } for pid=10187 comm="syz.3.49966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7945.459561][ T28] audit: type=1400 audit(268452104.348:406525): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7945.460181][ T28] audit: type=1400 audit(268452104.348:406526): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7945.460509][ T28] audit: type=1400 audit(268452104.358:406527): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7945.494437][ T28] audit: type=1400 audit(268452104.388:406528): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7945.494917][ T28] audit: type=1400 audit(268452104.388:406529): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7945.520281][ T28] audit: type=1400 audit(268452104.418:406530): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7945.527117][ T28] audit: type=1400 audit(268452104.428:406531): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7945.529357][ T28] audit: type=1400 audit(268452104.428:406532): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7945.531939][ T28] audit: type=1400 audit(268452104.428:406533): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7948.768200][T10210] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2 sclass=netlink_tcpdiag_socket pid=10210 comm=syz.5.49975 [ 7949.600122][T10226] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10226 comm=syz.5.49984 [ 7950.308142][ T28] kauditd_printk_skb: 167 callbacks suppressed [ 7950.308644][ T28] audit: type=1400 audit(268452109.208:406701): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7950.346809][ T28] audit: type=1400 audit(268452109.248:406702): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7950.347235][ T28] audit: type=1400 audit(268452109.248:406703): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7950.351061][ T28] audit: type=1400 audit(268452109.248:406704): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7950.366518][ T28] audit: type=1400 audit(268452109.268:406705): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7950.391320][ T28] audit: type=1400 audit(268452109.288:406706): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7950.391852][ T28] audit: type=1400 audit(268452109.288:406707): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7950.429123][ T28] audit: type=1400 audit(268452109.328:406708): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7950.436285][ T28] audit: type=1400 audit(268452109.338:406709): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7950.447123][ T28] audit: type=1400 audit(268452109.348:406710): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7954.577244][T10312] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10312 comm=syz.3.50027 [ 7955.889479][ T28] kauditd_printk_skb: 315 callbacks suppressed [ 7955.889940][ T28] audit: type=1400 audit(268452114.788:407026): avc: denied { create } for pid=10322 comm="syz.3.50032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7955.911461][ T28] audit: type=1400 audit(268452114.808:407027): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7955.924134][ T28] audit: type=1400 audit(268452114.828:407028): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7955.954408][ T28] audit: type=1400 audit(268452114.858:407029): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7955.956715][ T28] audit: type=1400 audit(268452114.858:407030): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7955.957234][ T28] audit: type=1400 audit(268452114.858:407031): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7955.968693][ T28] audit: type=1400 audit(268452114.868:407032): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7955.973636][ T28] audit: type=1400 audit(268452114.878:407033): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7955.976716][ T28] audit: type=1400 audit(268452114.878:407034): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7956.082656][ T28] audit: type=1400 audit(268452114.968:407035): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7960.917103][ T28] kauditd_printk_skb: 177 callbacks suppressed [ 7960.917467][ T28] audit: type=1400 audit(268452119.818:407213): avc: denied { recv } for pid=10366 comm="syz.3.50053" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7960.917714][ T28] audit: type=1400 audit(268452119.818:407214): avc: denied { recv } for pid=10366 comm="syz.3.50053" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7960.925386][ T28] audit: type=1400 audit(268452119.828:407215): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7960.933008][ T28] audit: type=1400 audit(268452119.828:407216): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7960.933483][ T28] audit: type=1400 audit(268452119.828:407217): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7960.967724][ T28] audit: type=1400 audit(268452119.868:407218): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7960.974664][ T28] audit: type=1400 audit(268452119.878:407219): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7961.030649][ T28] audit: type=1400 audit(268452119.928:407220): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7961.035939][ T28] audit: type=1400 audit(268452119.938:407221): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7961.050330][ T28] audit: type=1400 audit(268452119.948:407222): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7965.954971][ T28] kauditd_printk_skb: 355 callbacks suppressed [ 7965.955305][ T28] audit: type=1400 audit(268452124.858:407578): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7965.957373][ T28] audit: type=1400 audit(268452124.858:407579): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7965.959131][ T28] audit: type=1400 audit(268452124.858:407580): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7965.993177][ T28] audit: type=1400 audit(268452124.878:407581): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7965.993617][ T28] audit: type=1400 audit(268452124.888:407582): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7965.993957][ T28] audit: type=1400 audit(268452124.888:407583): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7965.994201][ T28] audit: type=1400 audit(268452124.888:407584): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7965.994432][ T28] audit: type=1400 audit(268452124.898:407585): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7966.024647][ T28] audit: type=1400 audit(268452124.928:407586): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7966.030719][ T28] audit: type=1400 audit(268452124.928:407587): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7966.380412][T10470] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10470 comm=syz.5.50104 [ 7966.682557][T10475] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10475 comm=syz.3.50107 [ 7967.409946][T10487] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10487 comm=syz.3.50113 [ 7967.913592][T10498] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10498 comm=syz.3.50118 [ 7970.092011][T10537] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5131 sclass=netlink_audit_socket pid=10537 comm=syz.3.50135 [ 7970.963304][ T28] kauditd_printk_skb: 310 callbacks suppressed [ 7970.963701][ T28] audit: type=1400 audit(268452129.858:407898): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7970.969805][ T28] audit: type=1400 audit(268452129.868:407899): avc: denied { recv } for pid=2899 comm="syslogd" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7970.981453][ T28] audit: type=1400 audit(268452129.868:407900): avc: denied { recv } for pid=2899 comm="syslogd" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7970.981807][ T28] audit: type=1400 audit(268452129.878:407901): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7971.025456][ T28] audit: type=1400 audit(268452129.928:407902): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7971.053317][ T28] audit: type=1400 audit(268452129.958:407903): avc: denied { recv } for pid=3085 comm="syz-executor" saddr=127.0.0.1 src=40350 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7971.061579][ T28] audit: type=1400 audit(268452129.958:407904): avc: denied { recv } for pid=3084 comm="sshd-session" saddr=10.0.2.2 src=43352 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7971.128697][ T28] audit: type=1400 audit(268452129.998:407905): avc: denied { create } for pid=10554 comm="syz.5.50146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7971.129115][ T28] audit: type=1400 audit(268452130.008:407906): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=40350 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7971.137748][ T28] audit: type=1400 audit(268452130.008:407907): avc: denied { write } for pid=10554 comm="syz.5.50146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7972.070801][T10566] netlink: 100 bytes leftover after parsing attributes in process `syz.3.50151'. [ 7972.843518][T10576] input: syz1 as /devices/virtual/input/input62 [ 7974.333790][ T29] INFO: task syz.4.46945:3826 blocked for more than 430 seconds. [ 7974.334230][ T29] Tainted: G L syzkaller #0 [ 7974.334638][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 7974.334944][ T29] task:syz.4.46945 state:D stack:0 pid:3826 tgid:3824 ppid:3083 task_flags:0x400140 flags:0x00000001 [ 7974.335408][ T29] Call trace: [ 7974.335705][ T29] [<81aeb24c>] (__schedule) from [<81aec660>] (schedule+0x2c/0x134) [ 7974.335960][ T29] r10:8339cb00 r9:83f79000 r8:85e16a00 r7:851baa68 r6:85833400 r5:ebe95df8 [ 7974.336097][ T29] r4:847224c0 [ 7974.336223][ T29] [<81aec634>] (schedule) from [<80769714>] (__fuse_simple_request+0x398/0x4f4) [ 7974.336445][ T29] r5:ebe95df8 r4:851baa10 [ 7974.336569][ T29] [<8076937c>] (__fuse_simple_request) from [<8077a55c>] (fuse_send_init+0xd8/0x134) [ 7974.336779][ T29] r8:85f1f240 r7:8077b68c r6:00000000 r5:85f6cb80 r4:85833400 [ 7974.347240][ T29] [<8077a484>] (fuse_send_init) from [<8077b710>] (fuse_fill_super+0x84/0x90) [ 7974.348426][ T29] r5:8339cb00 r4:86130400 [ 7974.348485][ T29] [<8077b68c>] (fuse_fill_super) from [<8057bb60>] (get_tree_nodev+0x60/0x90) [ 7974.348590][ T29] r5:8339cb00 r4:86130400 [ 7974.348613][ T29] [<8057bb00>] (get_tree_nodev) from [<80779e24>] (fuse_get_tree+0xdc/0x1c0) [ 7974.348681][ T29] r7:85e16a00 r6:85e693c0 r5:85f6cb80 r4:8339cb00 [ 7974.348700][ T29] [<80779d48>] (fuse_get_tree) from [<80578c84>] (vfs_get_tree+0x2c/0x118) [ 7974.348760][ T29] r7:00000000 r6:ebe95f6c r5:8339cb00 r4:00000049 [ 7974.348778][ T29] [<80578c58>] (vfs_get_tree) from [<805a48f0>] (fc_mount+0x14/0x7c) [ 7974.348872][ T29] r6:ebe95f6c r5:8339cb00 r4:00000049 [ 7974.348890][ T29] [<805a48dc>] (fc_mount) from [<805aa600>] (path_mount+0x434/0xb60) [ 7974.348946][ T29] r5:00000413 r4:00000049 [ 7974.348963][ T29] [<805aa1cc>] (path_mount) from [<805ab364>] (sys_mount+0x1dc/0x260) [ 7974.349034][ T29] r10:00000015 r9:b5403587 r8:83f79000 r7:00000000 r6:85f1f240 r5:200003c0 [ 7974.349054][ T29] r4:00000000 [ 7974.349068][ T29] [<805ab188>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7974.349126][ T29] Exception stack(0xebe95fa8 to 0xebe95ff0) [ 7974.349167][ T29] 5fa0: 200003c0 00000000 00000000 20002080 200020c0 00000413 [ 7974.349205][ T29] 5fc0: 200003c0 00000000 00346318 00000015 003462d8 00000000 00000001 76f270dc [ 7974.349235][ T29] 5fe0: 76f26e88 76f26e78 00018bc4 00130300 [ 7974.349276][ T29] r10:00000015 r9:847224c0 r8:8020029c r7:00000015 r6:00346318 r5:00000000 [ 7974.349297][ T29] r4:200003c0 [ 7974.350299][ T29] NMI backtrace for cpu 0 [ 7974.350447][ T29] CPU: 0 UID: 0 PID: 29 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT [ 7974.350523][ T29] Tainted: [L]=SOFTLOCKUP [ 7974.350541][ T29] Hardware name: ARM-Versatile Express [ 7974.350566][ T29] Call trace: [ 7974.350612][ T29] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7974.350690][ T29] r7:60000193 r6:60000193 r5:822a8a28 r4:00000000 [ 7974.350961][ T29] [<80201af0>] (show_stack) from [<8021e410>] (dump_stack_lvl+0x5c/0x70) [ 7974.351040][ T29] [<8021e3b4>] (dump_stack_lvl) from [<8021e43c>] (dump_stack+0x18/0x1c) [ 7974.351113][ T29] r7:00000000 r6:00000113 r5:00000000 r4:00000001 [ 7974.351132][ T29] [<8021e424>] (dump_stack) from [<81ad4c7c>] (nmi_cpu_backtrace+0x150/0x170) [ 7974.351200][ T29] [<81ad4b2c>] (nmi_cpu_backtrace) from [<81ad4dcc>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 7974.351269][ T29] r7:00000000 r6:8280c550 r5:8281af38 r4:ffffffff [ 7974.351287][ T29] [<81ad4c9c>] (nmi_trigger_cpumask_backtrace) from [<8022f124>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 7974.351376][ T29] r9:82ac7834 r8:8280c6d8 r7:000bb5c0 r6:84722ca8 r5:82804d80 r4:00000048 [ 7974.351395][ T29] [<8022f10c>] (arch_trigger_cpumask_backtrace) from [<81adc8bc>] (sys_info+0x68/0xa8) [ 7974.351456][ T29] [<81adc854>] (sys_info) from [<80385260>] (watchdog+0x59c/0x8d8) [ 7974.351533][ T29] r5:82804d80 r4:84685414 [ 7974.351591][ T29] [<80384cc4>] (watchdog) from [<802814a0>] (kthread+0x11c/0x154) [ 7974.351668][ T29] r10:00000000 r9:df819e60 r8:83103500 r7:00000000 r6:80384cc4 r5:831f8000 [ 7974.351690][ T29] r4:838808c0 [ 7974.351707][ T29] [<80281384>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7974.351758][ T29] Exception stack(0xdf8d5fb0 to 0xdf8d5ff8) [ 7974.351790][ T29] 5fa0: 00000000 00000000 00000000 00000000 [ 7974.351825][ T29] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7974.351860][ T29] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7974.351898][ T29] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281384 r4:838808c0 [ 7974.352067][ T29] Sending NMI from CPU 0 to CPUs 1: [ 7974.353461][ C1] NMI backtrace for cpu 1 [ 7974.353673][ C1] CPU: 1 UID: 0 PID: 2811 Comm: pr/ttyAMA-1 Tainted: G L syzkaller #0 PREEMPT [ 7974.353748][ C1] Tainted: [L]=SOFTLOCKUP [ 7974.353773][ C1] Hardware name: ARM-Versatile Express [ 7974.353825][ C1] PC is at sched_balance_update_blocked_averages+0x84/0xbc [ 7974.353926][ C1] LR is at _raw_spin_unlock+0x2c/0x50 [ 7974.353992][ C1] pc : [<802a1bc0>] lr : [<81af5654>] psr: 20000113 [ 7974.354039][ C1] sp : df805f08 ip : df805ee8 fp : df805f1c [ 7974.354081][ C1] r10: 00000101 r9 : 846f24c0 r8 : 0000001c [ 7974.354133][ C1] r7 : 00000007 r6 : 00000006 r5 : 60000113 r4 : ddde5400 [ 7974.354186][ C1] r3 : 846f24c0 r2 : 00000101 r1 : 00000001 r0 : 00000001 [ 7974.354323][ C1] Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 7974.354400][ C1] Control: 30c5387d Table: 84e3e2c0 DAC: 00000000 [ 7974.354476][ C1] Call trace: frame pointer underflow [ 7974.354577][ C1] [<802a1b3c>] (sched_balance_update_blocked_averages) from [<802abb80>] (sched_balance_softirq+0x50/0x6c) [ 7974.354653][ C1] r5:00000000 r4:ddde5400 [ 7974.354672][ C1] [<802abb30>] (sched_balance_softirq) from [<8025a1bc>] (handle_softirqs+0x15c/0x4ec) [ 7974.354738][ C1] r5:00000020 r4:8280409c [ 7974.354755][ C1] [<8025a060>] (handle_softirqs) from [<8025a6e8>] (__irq_exit_rcu+0x150/0x1d0) [ 7974.354821][ C1] r10:8295bb34 r9:846f24c0 r8:00000000 r7:eb3f9e78 r6:82456cc4 r5:82491b34 [ 7974.354843][ C1] r4:846f24c0 [ 7974.354860][ C1] [<8025a598>] (__irq_exit_rcu) from [<8025aa20>] (irq_exit+0x10/0x18) [ 7974.354914][ C1] r5:82491b34 r4:826cbcdc [ 7974.354929][ C1] [<8025aa10>] (irq_exit) from [<81ae78f0>] (generic_handle_arch_irq+0x7c/0x80) [ 7974.354986][ C1] [<81ae7874>] (generic_handle_arch_irq) from [<81ab69a8>] (call_with_stack+0x1c/0x20) [ 7974.355072][ C1] r9:846f24c0 r8:00000000 r7:eb3f9eac r6:ffffffff r5:60000013 r4:81af5740 [ 7974.355090][ C1] [<81ab698c>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 7974.355137][ C1] Exception stack(0xeb3f9e78 to 0xeb3f9ec0) [ 7974.355168][ C1] 9e60: 83fc7c40 60000013 [ 7974.355204][ C1] 9e80: 00000000 00008c63 00000001 00000000 8295ba98 00000117 00000000 00000001 [ 7974.355237][ C1] 9ea0: 8295bb34 eb3f9ed4 eb3f9ed8 eb3f9ec8 80acd358 81af5740 60000013 ffffffff [ 7974.355259][ C1] [<81af5718>] (_raw_spin_unlock_irqrestore) from [<80acd358>] (pl011_console_device_unlock+0x20/0x24) [ 7974.355325][ C1] [<80acd338>] (pl011_console_device_unlock) from [<802e6910>] (nbcon_emit_one+0x88/0x100) [ 7974.355385][ C1] [<802e6888>] (nbcon_emit_one) from [<802e6b90>] (nbcon_kthread_func+0x208/0x2ec) [ 7974.355455][ C1] r6:82ac410c r5:8295ba98 r4:846f24c0 [ 7974.355471][ C1] [<802e6988>] (nbcon_kthread_func) from [<802814a0>] (kthread+0x11c/0x154) [ 7974.355541][ C1] r10:00000000 r9:df931b48 r8:84c97600 r7:8295ba98 r6:802e6988 r5:846f24c0 [ 7974.355562][ C1] r4:83880400 [ 7974.355578][ C1] [<80281384>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7974.355623][ C1] Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) [ 7974.355652][ C1] 9fa0: 00000000 00000000 00000000 00000000 [ 7974.355683][ C1] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7974.355713][ C1] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7974.355748][ C1] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281384 r4:83880400 [ 7974.389602][ T29] Kernel panic - not syncing: hung_task: blocked tasks [ 7974.402858][ T29] CPU: 0 UID: 0 PID: 29 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT [ 7974.403228][ T29] Tainted: [L]=SOFTLOCKUP [ 7974.403382][ T29] Hardware name: ARM-Versatile Express [ 7974.403602][ T29] Call trace: [ 7974.403839][ T29] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7974.404256][ T29] r7:8281f934 r6:00000000 r5:822a8a28 r4:00000001 [ 7974.404512][ T29] [<80201af0>] (show_stack) from [<8021e410>] (dump_stack_lvl+0x5c/0x70) [ 7974.404867][ T29] [<8021e3b4>] (dump_stack_lvl) from [<8021e43c>] (dump_stack+0x18/0x1c) [ 7974.405204][ T29] r7:8281f934 r6:00000000 r5:831f8000 r4:82a80d14 [ 7974.405401][ T29] [<8021e424>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 7974.405647][ T29] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 7974.405923][ T29] r7:000bb5c0 [ 7974.406053][ T29] [<80202818>] (panic) from [<80385278>] (watchdog+0x5b4/0x8d8) [ 7974.406397][ T29] r3:00000001 r2:00000000 r1:00000000 r0:822a9710 [ 7974.406722][ T29] [<80384cc4>] (watchdog) from [<802814a0>] (kthread+0x11c/0x154) [ 7974.407197][ T29] r10:00000000 r9:df819e60 r8:83103500 r7:00000000 r6:80384cc4 r5:831f8000 [ 7974.407824][ T29] r4:838808c0 [ 7974.408048][ T29] [<80281384>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7974.408661][ T29] Exception stack(0xdf8d5fb0 to 0xdf8d5ff8) [ 7974.409242][ T29] 5fa0: 00000000 00000000 00000000 00000000 [ 7974.409784][ T29] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7974.410096][ T29] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7974.410402][ T29] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281384 r4:838808c0 [ 7974.414861][ T29] Rebooting in 86400 seconds..