last executing test programs: 12.240005859s ago: executing program 0 (id=1263): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0x4}}}]}, 0x3c}}, 0x0) 10.930321457s ago: executing program 1 (id=1265): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x4, 0x0) 9.346075389s ago: executing program 0 (id=1266): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020a000307000000000000000000000005001a0000000400000000ac1414bb000000000000000000000000000000e3"], 0x38}}, 0x0) 8.406801264s ago: executing program 0 (id=1267): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) dup(0xffffffffffffffff) 8.390113275s ago: executing program 1 (id=1268): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000000000)={0xc, {"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", 0x1000}}, 0x1006) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000010c0)=0x4) 7.591233277s ago: executing program 0 (id=1269): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000b60000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) 7.246438008s ago: executing program 1 (id=1270): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="180100001700000000000000a54b0000850000007500000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x2b) kexec_load(0x6, 0x0, 0x0, 0x3e0000) 6.66919121s ago: executing program 0 (id=1271): openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000001040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) write$binfmt_script(r2, &(0x7f0000000340), 0xffffff46) dup3(r2, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180), 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) rt_sigreturn() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) rt_sigreturn() mlockall(0x1) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) ioctl$TIOCCONS(r0, 0x5413) 6.394765414s ago: executing program 1 (id=1272): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) open$dir(&(0x7f0000000100)='./file0\x00', 0x2242, 0x0) syz_fuse_handle_req(r0, &(0x7f0000004140)="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", 0x2000, &(0x7f0000001000)={&(0x7f00000002c0)={0x50}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f00000081c0)="e0332f8f5747b9f778142cc174a9b5f0244b78bb6346cb5fc9135b8220090ee698fddc241870359d32327f299718466d88c89e68097036bb35abfe03e3c02234dcdb2c7d1209c657485ca1aa3f2fb80e71397b80fca6f3cf2367fb19eb95e5b4a0170063374645d9e020099ffd7def3d94cd29412b3d7b7a47bc70121be848cfcecea78d41a93622b134bd06e84dec07a9e5abc29cb02d5b9091e748cffacf48352628822bab7b24a17bdf4b3f3bd9fb17793496aa6490da3f58039ce5b40745dd63f82d93bed80b50ca5742d67d39029a98db95c9392e2d5fd9a35bad30cfe98682b5a069738a12c3cfd25949106cfc839202fd21c2b28e44be73280d5037351ead2dd1c277d9cc9088c6b14365eb0937ea9685f6b26232293803260f2c8cfe176b55df304bc2865b8f52581afc4beed445ae8cc405cb7bcc51103aef812c41437c5b070a3591ad0964677f4f9017bb300727dfab009056bee3671a9694be2e2f2173fcc06ceba5aed0d9da697cd88365c5c354788efcc705e90d572e34e9e566fc206a8167970ecb9cbc43f4d9de4d43688582b6600dfcfc7379c831e756a45835647bd87879a3e3942c61b9ea2c2af35d49a4caa9a109b0beb972996ff8924ea371e15dc48efd12b1203a7f1fe354977fcf9e4ee2c8f210387e551ddb55e5f67ee6bb9bc8772649693b0adf24606e8ccc59f020834d8cbfcadfa1770549fe464dfc412308fbaee8d30bd20c002794bfb923bac6b490841248d12ad9a0e54d1d96e3aff5dc4930a6c8b7c75264a46af7a6339725fb84e0363463ebaaaf58d6b9309ae7c87a8df8c68d2487d684011de1fa7645f3f48cf3bb61bee8bcace2f8ef5f967f2765f8086aeaa5dcc34c84e379a7ddd6438cccb5b80952fae37863708041eadbc4ad2b2ef98412a46f74a171ad056429dbb723cdb9ca9f9f03170dba2870e5988b7cb755599d1eb8f7eaf5c8ded4b56022cb479d0bdfae18f69f9ecc42f4c181ea10838229ba5db7f088ad8d5f77e49c1fd93ed6b983c43b23c7eeb1233f0c114885057a27cd3f67a309e3fecba241836bc92308b830b10b04af6c9595b44e859b9ca7ef079e151fdd500060787be3a7a5b3e23b06ec70f087134504f8b8e7b6799ebfe14f698ba7a813a380e6f92cace9230aa8094a2465f7224e2becad469d0aaf0e48b0098eacfb17abdb69bb2ebba97a09d2b739b532d70db91fcb0fcb38bccdc01d7c8113024ea8b619e385e58d31899721416e10b408504a9c4fcf870d21051227440a616cf62f6637b62eceaee09029f88009be02269cb5e5ed090c6f5e6c652c31214aef301bd23ec2504f90991cd27539c1b8b54db51825e951d076cd0e70f56de4b91894ce22049205483a0fe7d7886b36118bebd96d138980e26604b6e70a7275c6b81501143119a8c2c271558202eda196704ef9ae3c33301e1afbe56d069ce4926bf531d960f3df58192f3da558adc111ae8ed6e24e04e95c406b34b1f4ed2726ef0f6a67dd84c75636984191d019cebfa883fdf99affcdb4c874614a5312455403895891daf7469d6721583ccd1290ab05b14516f22965fc52c4a528f1a5c20cc133fea279d9efc991ec4d51d2654daceda234f6d3b0c635db697aba3eeaf8356319adba42428266ac09a6e6495ca8f60c1c4e052068511696296e88ef86a591948627ba97df634e0063eb5f208df00a069b1213c29e58cf76f591253d60de9d7c01d29992ccc728140299c429fec0df9d90f83fa2467ce00de83b16d10c7edb80ff8d4b1b19eea9bd1e2783a0d41215c9cf23bc3ca1ff414e3f29aadba00c5a8d5b44c28c10e99140e5428278e54bfd880a93fd1b54b560422ab2bfcf120a7902373b6442c6e9867b19aa0a6b77b1634ab6fd1c8a1d90d99ebb9ebcb89d593562b266fbc53c40501f9298690283c45059b3f6ee278e46cb3904c947446c28af8855b2a68e6e0c0da205a6e12fdd15b393d579039b31c1a54230ac2ea13cf1f5540046b4dcccdd731fff7323c4880e5d2d8668d8a7f08920715c17ef9652eb55f224c82a6fdb970dbf1032403f283bd868a23f4785a6ab9c0bcd2308dba1a1f258ae512cf64784e501008db366ab7093a6cc4b6ee86154d44a1a15c10834602dd5ccf730f6d1142ac19d113496dbcb80021cb5733924265d082a8453b5c21e0245e4a2627e8df090da6a129ee49c58c1a7437369acdee15f5e4e5638f05d9f6391572d9890219def702a013a2b05239664dba44feec2a9508a3200b47de03e6a784bca2f3633df534af33da0a95a34ca845b61a22ff55a5a4c04ff9e06e7162f458a8c56e106e75ffb76a921f4057dd73d5f3801aa78ca4c78d6b79bce560404c2fe3d57876287f73e84c27c486ffb997951f9e0b3aa81a5e7804ac7360add11e7851842d0ed8df041c999e50226fef006373bbb53d5d8e9d1653924e60234fd0b6645b821746f3d88591ff66e294e8e958ca425ddbc7d604f7cbbcb9d5fe0d4ad53878eb16bc801def1005e1eb12a6d4924d2179948e7aa542f2600ba3c6c600629d64c529c7326c1f38aa4e1a6cc259e58f86400d65d67856c8f4fffc33ad4c279dc05367307f562f8127f37b03c3cf38a97cfde0c02aad8ac40d347a9e0a496f227c068dc6c666fb2b6a18990f607399b0707d135752d93739e1840b5b4c125c81eeeb318869b408f87778451e49f3ad988a8aa97672989ad367833ff7e7f0e79c37ac794fe466623e122127fb94ebbc01bc775183b26b2dc407b1aa1a55d4ce04dbe1df4fba0377fea4c4bfa5a37c4dd733fd116b9c7f50b11dd512ad68646b9ddca295fe27bee78476901fbb5c8d2856ae0e9e21ab26e3587c1325f1fa28edb4081f2ba309d5fc39f7f54abbd0d5a152c2f7e3a8b3a5ef6e097b109061c91124f41f33055a7bb86706629f614d40346715cf2fe387ef4e4fc6646839824d3ef85eeac85bc5e681320f6fa7057e0a10de8c4678b48510f77b91bb397dd1209eaba8ea1f237c348e9e0d7af1229e2c04b6560e48e3a7491f3066b63a8923becdcfd8594c1c55098a51283b599765b049831cacd9478e5e996c778d524b476f6677218c94886d7548be7617e5796e35bb3c9b13d70e4897867d85f0350e9329985f051fb556b861aef7dead54e6b29b9ad837cb4774f47a5371ef034612aa0c151345546b876b53e9f2c06e3ce0113e67eba8842f4ac5b51a61315bf050078c710dcf14371d9593730b1d0302ef999f488bbf42b7360171da98ad68932bda4937358fd1d0c2bcd04f7dbe2beaffa0d53cccda316cb19270cf4aa56695ef3203b49fe92d1623cc1d714da6b8f94112db1781562ab2ae50bda23debd55da440434299c992f2f8c264310d6d8ccdd042737db0253d6889d8bf36fe99a131b73300c9798b8fd58b5fc681b97e71230cd3094e441fe5cf1294bbc28f41146f06e39d5e19e673dd489dbddfc16fe281160a8008e375025cbf25e84945f2f0a5ffb2cd58273328ea9d7533b2f0861eff95823cea18dc1877183fefab808bda0890f91f1d79b36953b138fd62caea3411900647a4afadfecade2ff6274175f06614d108daaf9821c413a137e33c826957953bb39e2d852097f978c3577abcb71d68b45794247d8e82614979708f6d6d0e469828206b22913d6d320d815d42c0d943640c63196f703f946089f535eac511e26c6a5a529e875eb15aaf65fd50dcbaf37a009f2f9081cdbc744cf7aa2336913e89f1961581ad4bb6aeb1d23a787e2d3f99639871df5842c30581263d5139128f076767ef48bb636d7aae06581de6baa55a12019d3ed831950915fdc1eee819dd01047bda606f2852699529718c99606246a92bb1dd9435d8f3a48646c0e423441bc783be358c0c91e6846419b6c0a81354500cb2721834dc11ba40c3bbe5717e5142922a168ca0e20fc269ea584c7f68ff7cced62c4277385368b4ad596b79c45a9c4575c37f300cab37a5693cb777fabed412934d3a77505b17cb2628119ddff45f3fcbffb50386eb9cfb6f82b37fa852ad4b65bf8e2898b11bf051cb7fb0fa81cbf81b9d9ebb05498aeb2691eb15297edd682976d5a4f444cdaa82f063bc4482c28c4e6257c7cf3e5ee5a502c6527b77b12725e7526ff896ee2f8066536dce04d63072a34c19d533d4dbdb93e7185482cbf7510c5eef2f8aebebad011727cd8061a367b7e1868252bb43d9a74c9c6a10539e357d5367fac69a9296fe5a79a2e5b45950ff462e0e882aa32ff7f29b5644e5311f3e0b076c58683de29ad9dd8b2c92a41ca8313ac997e44981e82aec550bbf6c88adf3d54e9fdf93d9dce95289e9086043d888f19d209cbea79e0f5b2c81b2c3889eae1cb5305e282b883c4cfa3798eceeabb442a74ff6a8470020a296ef01d8e32553663c844e67e5a3a44375f0074ce9547a6c489ee86d7652219491f35c6b904d51a26c3d2cc77d8ff97050dd0d0aed4a1ecf1db7ac48673a1dcc70ac16f709dcf4b90148aede5302111ceaa3a81c49b724cfa206283b62513f96c1da77efafe2d2d08a5f391ab690b5d974ceed2e95e85b1039def0e94c79cc0aa1de1f8133e985adfadf4a657710487b265bb6692fd2b91a06ac98d50b052b8a13168e2638b93209238fbe67f4590a81a2cdbcc479ca9178720a6ec05bc9457f27ad2e2fd2f4e9c643ef85b6287a01f7fd597799cce7d6464ed3c95110733d4ba92314ba3dd81e51f541a6e37f8bb14376e41560f9049b4ff349a467defc205f915a345b5f06d090645180ca642c719f03e9813bff7fd635660efe38b022130d42f2cedd792bcba2bfb14385c6d1cbe5ff2e38c22f1f8d5e4d93d296042507e43f24ff904827b16f2a3572d26078d7fdb0cfdbe2e6bee07b94ae441e510681c96f97ef0ddbd7efbd80ce0689f6e2022a189dd2937d3eadd82a154a5fac91b5ef48523706957b8d5f55077973e9a036009d745a6df39ba154dc59c4ef784d62b3f2d782dc508242a1b0e4cc294b6e62e98ef946f0d984c3174cf86b8a0beb615f046ec50dd0c8a9c0f36df60bd162f1130f894085e7c47b6c28ff336f5d75166c1840e7ad07204fc10ce976505f6aece0316d8c65b973f61cea2fe4c6db722717985c25249f041c07a86b878702a8c9ab7c33fe41039041aa38489b02a28f18d69ab34619e9e35514c54592c8059984ace64b5302b5f22d68c35c7ffb23c63ce877a1e1b160dd2c329eabcc0e1e3072021bd811de3c0c7a68af20ddb9e2912b7eecc2a8cf083a252d0fe31629b20559f7b976e4d8625644385c692b8cdc2886a42d750962d0dee10a1546ecb7ef961216cc456d2450a44aab07014fe0be076ca6bcb46b644af844b2ad8b3817f1895a5d579af3dc937541f4b7e9203e7a7af534b406d8f6e3bc555d767603122ab1c4e62de19d6af63be8e39fe45732859d6d92e11f1a847f7d62764b6364aa7f95f03cc7deba178fb03a467da5be71657ae50ff6bf93c51efb7d19ac9887e92fe5f3c9d545209eff307c9e02073bd3404827e148aa63c135ed668589bdfec38cb4771620124d02f1b03993f89e96b33b32e52ddffb0580dac45422ba7a3fef76e519a3dc8d12eac60c2d2f8c4303aafa3e80135c403360d51c9cdeba3ffb31e664302f587e0e983ede7f9b2bfe2bc64bd5029cfa88445e043e08f3e9affee25e980e75d2664738726e3d2eade7dce0ece78a514bbbe5a54c121374d079e3b05996052d66889742232b73e950e1a9892e7352c9e546a8cfb48332d2b2be6327208ca51dc2869a562581947f62b0d5bfb3e0911d4854f822d6738b4deb195840d2bbae0b074b8d1e1010c24ec00052dce7d259e3044aab1a99d261fb3b49cf09dfc85473f94db06d49e202ca12182283d48144f8389a5301679901600bf8130d36315b277a99204b85a1598f84bd2d4c4893108f6717bf44234181467d6eeee61e1823268b5c60bf04d0e13e429f411b51adfca20ff1a1b1eee203d59b03da1643c3e9fc474a91470116c6c5275542adb10f3adae2ae87e88b93f334e0ceb6216fc081e8d84d8b0a503196dc50599b22b89b807627b427a815aea0dbca69e5fb215ee996395d8a21a1c67ac295be33c6517504e1f00f579f8c484873cc670b5b9e787b1c30ca1f0b25f8bb8f4bde3b3f4fa730c292cbf97b25068ba9c65f78c555d5f75d52a57958d7111e824f3afa16484f625abf62afc80654c36fd9f8284466422fb18e08274e8febc719d45b784974d50d187ad2349429af3f7930252a4d45997762e9d5f5493d408ca144532aa89aa3d43c46951dafb8f81794e2e9679ce238cfe86e112f4f046d87feec3be04461032819d62f217faa71fa9dc6da8861015567d1f7309090e25b7015dcc6d72a5e7ba53296ab1bc72467ac50831628cf5238155aed3fb189a8b527ebd38771e16454fe51e3edde55cea454414690491207c23f6cf33aaeeda432de2d1ede04e039a16245e66cce6f4e4ea534f290f02a2a81a46d6ffea7967dfbe37461f83d472091156594852823392efc953f4ac099d74e2d0328d9f47bd952352981a34055acd0273309484ab56afa85ff0c22fb53ac5d7cc8e346b4c2f38a4e2451738146b7b90c14f826c7dbc1b2be79d83772a8d629f2dfaf15286a15be1ea22a05d4ee3de6a6bfb7e208dbbcc88e77baac940d6438aeeb77c3a32db08b46e79545b65f7f3c1bd433092bc9116668c338ab35c01cb5871167868c6b61bd4c0ca5f96e5ce2465da06c4a320839f3bb7c0dffd40d5bb9a32fcbc6f691787de7211da062616272c77c62ac83e4cb29fb954ab27d9009877b79be54acd336bfe2a6e087abaab004743f5ea4ec8ddfb8086920e8e458a413adb98077a3cf860513cc8a453eb129556c871be7e7232a6130c4332819ad17b289fdb31f8f8854dffb4cfeca6d792567b444c750820a2a8a2e0f93779e61a4966650909369fc8bd5bd2bad4ff95cc8a14f6cd83ae6411b4bfe1a9b5cdf1fcf32c54cef1731edc47d41fa581376b25006fc859b98805d70a157e501a2cb2ab425340965213adfecdb5addb2b4b2ec5cc6935e4e279bb98283fb20dfcd8a2c91aefda9dc5a57bba4d8803d1eb0f4ba9529de01e39c2aa60a91267c31d036a3f669b9377661837f58c6950fdf38986ea13ff5e9c4d966bf999002da1a854d54aa225b259d91eb88425328e7d13b06dea321a151a8dfc44755214da97168e8acf027d66b7fff45ded94fcde53ff80342d4595644549c4ed827225596e2b30480e94eb049b6cd718fe8424d044bb5098e0206047ddb81755e3cb92131dd47ec754b64c4b78f663e364cf8a74cdd9857c81316dc4ccd5f02a84b310abfbc9d6a23ee6d1eaf6b8fc1544cfeb06002c8a40fb0e49859d2073a7b1cb112713518ad5e007d0a256f901469bfa5cae98841f877faeb584d41bfe695da72ca5700ae085f39c99f769502ea9f43c0b84ca4611441d5adb3e5d0a426297e535258748169cad487f97d171c0630642943508206ce648aad2971297f3d4037d73e5fbc73460ca7401b7dbd7807273ae077a81fd0d4bc90b6068e3ec95afcfeab16619306fb23942a4308e8253b35f4912df392dfc5daf35dd842a5a1f78fc294cbdbd504056f0c7779121b5b3db7461e437347452476f3b0bb22e63aa23cb9d3e797c6c95513058d8fb2c27864ac0e1f5001c988e29c79bfa4236c7be41dee5561d825c1f0fbebc0c06cc4712e88ad5efd94f4eb4e93794af42a9752a2ebc57dc2f3881c75bbb23ad25b69619f9f5b07fe114ba291d2b5b4c1c175e1aa3ee3eda55e6126b3ad1e613bf8e0bbac727b879e7796fa0ad100893677a18b53f5eb31db43a97370d3749afa92fd0291fa96b05daa6beb43b9c1c11d9515976976d1cc1e44f35d317299ceb68ea2545f2a2b92b4e1046f6f92c33aae6995593189bb2611576599fd765b8e6fe2e88674ffd57ee8252287b1904d622c36a502db45c72b0d5fc3d983cc44bc955eb43911404667a4ab147d72b69ef2514dfb820ad75758e85df88499cea94ed658b4c1c2f49fe2bbb8d2dd97f844a6df289296cfb9cd5bc8d17aa235e2c4501b1422b25acd6dbc3a91d03904c545320524f9034955ab02f5d058097c37d23984baf808d28b3e12821eb8919a77c1b6a8bdeceecfcc487c39db592817dd378a7c5127b427e7279b2a82f6b8eec6b3fabe0947e353e7a386475b15011de93e2f2891f772ef90f4aba1ee1c4d7321c81ce4dcaa378daeabb93182c319494436dbe67d252a01291cacb59686ebd53c6df21c083e98fa299cf5e9b59f1ccea95c62b1437c8ff8754a6372b5b879ebc3241f6430871eafe35337d75cb68c42862846df4342ab434f7f0a7b9f66824e1e696e3dbecde179592774b7511e5a7a1a06ba601eb5f2a935c7cef0f83ecd412a84afdd05120fceb1afb6445ebfcdf12c2287bfb75dddccc45afb4f5bb1308d39309c92c0b61a322d5229881fa5d598113cce54107036ca9f63fe863d257c706fe89d5c7ae59a459c6f15ba48d80da4aff541797b26418acddb987df3544bc4918cdbbdd8dd1bc2163c89635044e7b4da878457727a667c0146a12b4c46639497243259bfe4aa5ea50eb79f39fa9209256c9a685e3e39d6d8b6a9ca7d3554fbff0908ad6c6ecf68e506c20b16cd4a98e3ada9eb0cb3eb0b75b13b6d80bf99eddf2282da52cec085d3a725b71c29395d605e1eb26143290946a3a0d24347fa46145735dbf4eabc12150b8d5f7eeca804d7ed1fecd0132d1b94ebec65cbc07dfd4d54a5140567e77c646bd92666922c43aca8e482c59b970fa43087eb76d6715e4e8e5ebe54ca391383ef685b133534fcc1e5c5eb56f9d76a888506c4ac8d289c37039e0c4f927b0e11e85c5c7ec1cf4b19bebee6014cb89ee57f2ade8d166005e956d46a0c01f60b58299479e8a59a2e88f1a7ffd08b27d92fc2772b338959bd0a1c9cb95075c3cc17043c818345b29b76c0b8ed41c8c7259cc780c657cb9509daec1558453cfe061f54e08523a55d3223897559d51096b680802144f1dfbc114cee5ba322e007c2af0c08867291dd732bfe4b24d1d5ae517a7f5903c369ac6b157d42eb6ca8c0d7b50fd533a56c814e7cf04db3012eebd53ec1b123d65ab1e462d9f9182b690d56a88ad5a1f4d89f1749b005e88085505cc6d7de8eeee08def67bc1d1519d44b7a62dc07e491f328f786956d9200f00d78829e6af7c1a5835366201374b9487330920d4c57e2f7073292e173acc2424bb0d5e0e9448b4c02f9cfc99bc408110b6a3e9bc3799e4b178c2871069bc7d9ceba564378f02b2932c36f159478b5facd452b595a86d119216af9d860bd3997305320159a69a70fc62284141d23d2dc1e5394b271d99e5570450f1c55807e96c7cbe1b7c2e3e96f69fecf0f375e36e0d2acf319e37199e98486a8d145ce2d996c1909402744cce63664a75e480b197c345360321e830e5572d1d7bfe5a129a67fa98e6eda5268fa588047859daa11d087d0dbf0ccc7e120e3a5820cb4f5dc06748317e3f866518eb66e39dc8a68a7411b3403fc8eeab8283dee4d767e8e5842ed922e03ae5b3c9c494d5ebc61527ccd1222740fedd9e469ba6b30761cf387d654081c7e63182860e4548748058914a9cea01caf074fe6a78fafa2b45c516f9f20af9ac6773a400fa9661a872f6b55f0ed52a9be9e9c35502604b924f0eb628d6545da322e0713f9a5587e87e4b04fa495423b7c72093b764adfd1430a2e608b7af3d2bf80fef00e5b69abe386618274921ff57621bb99739de2e066ff17e95eba027f6a35170af3a69e93359a9643e155832d45c1aa9a8f71ad35504b99d3d0a1c11ae108664ea36f4dcded083aee17ac9efe7ee3fdf7b63c7c09bcef62caa88708510d45cea79d323083ddbfe7e5d3d9138f206a7af82ef1d26c85015c3e55a285a35d0052546493536b9061db27291a9292033753b7bddac63dac6f6271689240e43523c434a65e1d35299e386c953d0c92f21057e0b7883e049d20961e75069587eb3df6206496f76bbfd96635bb19837ba2ab193d79072ffb8829306b63697ff104a65031b8a38c24cca9ba23d5cdf753169a00fe2b2c3849f234a7029b657b3324c10d553e601aa97d17024f7bf5a99f96392f4a079a83daa27f4e3b512ee8536e764ce4dc36fd0874dfa502a693e55bd9f116202c5e906703e2c43d84448598b7af78aa60a205c152841e75e23436738ccaa6bbcef87e6a237d86d1a5e38e56c162cd6d61a4fb8b410b1643ad557a22348edfa82c23db11c9abdd8141fce263a66537512e93a930a4801ad862a902c7c1e00eb7c7466b1351318b7196c2a9016c55a05e104e124bdb568132f9397e31b10d04e5284bd029ea2f6a3ed11854e09b5871d6a725c21a9ef5d7e729a90a8206d5f61e6e42e47dda3e31b9134d47872a0dd7a576b665ec6ceaa5fd7d85ed7feede9ac9fc23e40241c0318077edda75b62eb271e28fb3705f7b4950c14b721a3a74a7a4e4de02cef5de76a1602b906016c0892ef37db51b0a1dd53f28b3d896f20abbad1ad0e0220960423267fc6e1779d1150fd584dd184bb43278d2d68ff21ac0daeef5408348cb80f4a9e0e606f6048bbaa517289451f084fffb63c5d904788cfc310b5495528a58f4650dafc4e4675b99d35ebab710ac6fefcee6c51a2835510fb6d2dbd8f97c3e53fb7a23c3f3c0283eb2271504581b9c1fa31e35c117e56a5d668a9c57df3b4e1129ca019a8b877fa4a22768dfbdd9d2154e17f4a7755b065090d88982471bfb242d89af5c6782693a6ab1b1be74dfa5655ac3b5ef4ace8dc595803cf4025bdf5c0e9fbe7a12a3a313311809591da08a2cc6cd8480dc960e1f79fa208440a0e589be5756c36d5830a51c4bdc39c2a85c0431bae3a7331b2ffdf23623693d343a7938a8a8a4dd4d523c6450a705bccbb38427f06f4f84a18adf303c0ddecf4ce2b6cdde4e09a4c31816195f0fe9f05fcdc0609f8a75ad2f23d5c24faaf346c13ec0512a5c29477ac561c878085d1a323f6bab08e2fb9ee57d7bb621ef21caf3609d74036c6dc1d7be0b6058d89d2b8d9aa4462fa0a740be66e3fdaa957f27c5a26dc586ac8c927ab2d7cf1b761798ea4191be8f4423cf1a6727d0c5f27a9969a753573afa584dea82678f3471ba36d726c396d68c671e579120f1a11cd50fa66b26fc2d6cb74ba07edbd5d3a288cf58ed1255381df02b2fb8983b7cf833433d1ab8fdef12651c3507e4b69fbc4b234678cca36761e8da434e5f036f204a1400da15277ef27ac140e2d574b89c0fd617da27e6ce862883bbe81c288834b9477d0d440c15dad505b363fcc1cfef8e2e3a96438809505844196acd0af751dedfced67f209c2ffa9c6da842c93ff4b5fd54a67df904f2f31b4236728c99582a667a8461d397770a657ffa7d514b0f076d7f35e9704a836e7882a2acf0a0ec2158ac7234953c3696abdc791c0b163ee76fbcc5adc18b6fa0f51f76f3d313a0d891f1deb69f6e44289b1aa43a768b8d13270959763a2c45129daeea493a5b0d7b36753b223dca9a80373686534", 0x2000, &(0x7f0000000a80)={&(0x7f0000000200)={0x50, 0xffffffffffffffdc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 3.370463237s ago: executing program 1 (id=1273): r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x1, 0x10, 0xaf99, 0x10, 0x10, 0x10, 0x10, 0x7ff, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) 490.278756ms ago: executing program 0 (id=1274): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e20, @empty}], 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x4e20, @local}]}, &(0x7f0000000100)=0x10) sendmmsg$inet6(r1, &(0x7f0000003f00)=[{{0x0, 0xf, &(0x7f0000000300)=[{&(0x7f0000000140)="a2", 0x1a058}], 0x1}}], 0x1, 0x0) 0s ago: executing program 1 (id=1275): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @remote, 0xb}, 0x1c) listen(r3, 0x3) kernel console output (not intermixed with test programs): :system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1267.805900][ T31] audit: type=1400 audit(1267.730:18685): avc: denied { mount } for pid=9070 comm="syz.0.1119" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1267.815500][ T31] audit: type=1400 audit(1267.740:18686): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1267.835589][ T31] audit: type=1400 audit(1267.760:18687): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1267.836612][ T31] audit: type=1400 audit(1267.760:18688): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1270.388181][ T31] audit: type=1400 audit(1270.320:18689): avc: denied { unmount } for pid=8459 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1271.162778][ T9076] SELinux: policydb version -570608695 does not match my version range 15-33 [ 1271.164197][ T9076] SELinux: failed to load policy [ 1272.973077][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 1272.973194][ T31] audit: type=1400 audit(1272.900:18730): avc: denied { map_create } for pid=9079 comm="syz.0.1122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1273.007665][ T31] audit: type=1400 audit(1272.930:18731): avc: denied { bpf } for pid=9079 comm="syz.0.1122" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1273.021918][ T31] audit: type=1400 audit(1272.930:18732): avc: denied { map_read map_write } for pid=9079 comm="syz.0.1122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1273.023072][ T31] audit: type=1400 audit(1272.930:18733): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1273.023693][ T31] audit: type=1400 audit(1272.930:18734): avc: denied { prog_load } for pid=9079 comm="syz.0.1122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1273.024254][ T31] audit: type=1400 audit(1272.950:18735): avc: denied { bpf } for pid=9079 comm="syz.0.1122" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1273.051243][ T31] audit: type=1400 audit(1272.980:18736): avc: denied { prog_load } for pid=9079 comm="syz.0.1122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1273.075626][ T31] audit: type=1400 audit(1273.000:18737): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1273.076469][ T31] audit: type=1400 audit(1273.000:18738): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1273.078230][ T31] audit: type=1400 audit(1273.000:18739): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1273.233399][ T9080] SELinux: policydb version -570608695 does not match my version range 15-33 [ 1273.233762][ T9080] SELinux: failed to load policy [ 1278.035450][ T31] kauditd_printk_skb: 63 callbacks suppressed [ 1278.035559][ T31] audit: type=1400 audit(1277.960:18803): avc: denied { map_create } for pid=9089 comm="syz.0.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1278.048543][ T31] audit: type=1400 audit(1277.980:18804): avc: denied { bpf } for pid=9089 comm="syz.0.1125" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1278.058564][ T31] audit: type=1400 audit(1277.990:18805): avc: denied { map_read map_write } for pid=9089 comm="syz.0.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1278.064436][ T31] audit: type=1400 audit(1277.990:18806): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1278.086496][ T31] audit: type=1400 audit(1278.010:18807): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1278.115483][ T31] audit: type=1400 audit(1278.040:18808): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1278.116683][ T31] audit: type=1400 audit(1278.040:18809): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1278.132411][ T31] audit: type=1400 audit(1278.060:18810): avc: denied { prog_load } for pid=9089 comm="syz.0.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1278.133311][ T31] audit: type=1400 audit(1278.060:18811): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1278.134115][ T31] audit: type=1400 audit(1278.060:18812): avc: denied { bpf } for pid=9089 comm="syz.0.1125" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1279.433260][ T9092] SELinux: failed to load policy [ 1280.893909][ T9096] SELinux: failed to load policy [ 1283.771819][ T31] kauditd_printk_skb: 108 callbacks suppressed [ 1283.771929][ T31] audit: type=1400 audit(1283.700:18921): avc: denied { read write } for pid=4278 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1283.775297][ T31] audit: type=1400 audit(1283.700:18922): avc: denied { read write open } for pid=4278 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1283.815869][ T31] audit: type=1400 audit(1283.720:18923): avc: denied { ioctl } for pid=4278 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1283.855575][ T31] audit: type=1400 audit(1283.780:18924): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1283.871472][ T31] audit: type=1400 audit(1283.800:18925): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1283.889942][ T31] audit: type=1400 audit(1283.820:18926): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1283.893093][ T31] audit: type=1400 audit(1283.820:18927): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1283.957294][ T31] audit: type=1400 audit(1283.890:18928): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1284.215559][ T31] audit: type=1400 audit(1284.140:18929): avc: denied { read } for pid=9102 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1284.220716][ T31] audit: type=1400 audit(1284.150:18930): avc: denied { read } for pid=9102 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1288.776505][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 1288.776612][ T31] audit: type=1400 audit(1288.710:18991): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1288.782307][ T31] audit: type=1400 audit(1288.710:18992): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1288.806460][ T31] audit: type=1400 audit(1288.740:18993): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1288.808739][ T31] audit: type=1400 audit(1288.740:18994): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1288.812528][ T31] audit: type=1400 audit(1288.740:18995): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1288.813330][ T31] audit: type=1400 audit(1288.740:18996): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1288.814168][ T31] audit: type=1400 audit(1288.740:18997): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1288.828486][ T31] audit: type=1400 audit(1288.760:18998): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1288.829538][ T31] audit: type=1400 audit(1288.760:18999): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1288.831768][ T31] audit: type=1400 audit(1288.760:19000): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1293.786690][ T31] kauditd_printk_skb: 510 callbacks suppressed [ 1293.786947][ T31] audit: type=1400 audit(1293.720:19511): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1293.788355][ T31] audit: type=1400 audit(1293.720:19512): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1293.794722][ T31] audit: type=1400 audit(1293.720:19513): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1293.804551][ T31] audit: type=1400 audit(1293.730:19514): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1293.806244][ T31] audit: type=1400 audit(1293.730:19515): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1293.806920][ T31] audit: type=1400 audit(1293.730:19516): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1293.807591][ T31] audit: type=1400 audit(1293.730:19517): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1293.808218][ T31] audit: type=1400 audit(1293.740:19518): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1293.808796][ T31] audit: type=1400 audit(1293.740:19519): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1293.809547][ T31] audit: type=1400 audit(1293.740:19520): avc: denied { read } for pid=9110 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1299.072964][ T31] kauditd_printk_skb: 469 callbacks suppressed [ 1299.073100][ T31] audit: type=1400 audit(1299.000:19990): avc: denied { read write } for pid=8459 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1299.077121][ T31] audit: type=1400 audit(1299.010:19991): avc: denied { read write open } for pid=8459 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1299.080247][ T31] audit: type=1400 audit(1299.010:19992): avc: denied { ioctl } for pid=8459 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1299.105686][ T31] audit: type=1400 audit(1299.030:19993): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1299.127100][ T31] audit: type=1400 audit(1299.040:19994): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1299.142395][ T31] audit: type=1400 audit(1299.060:19995): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1299.145921][ T31] audit: type=1400 audit(1299.080:19996): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1299.152607][ T31] audit: type=1400 audit(1299.080:19997): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1299.373591][ T31] audit: type=1400 audit(1299.300:19998): avc: denied { read write } for pid=9114 comm="syz.0.1135" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1299.374564][ T31] audit: type=1400 audit(1299.300:19999): avc: denied { read write open } for pid=9114 comm="syz.0.1135" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1304.147177][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 1304.147231][ T31] audit: type=1400 audit(1304.080:20027): avc: denied { read } for pid=9121 comm="syz.0.1137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1304.185612][ T31] audit: type=1400 audit(1304.110:20028): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1304.213077][ T31] audit: type=1400 audit(1304.140:20029): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1304.246005][ T31] audit: type=1400 audit(1304.160:20030): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1304.247945][ T31] audit: type=1400 audit(1304.180:20031): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1304.256224][ T31] audit: type=1400 audit(1304.180:20032): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1304.349160][ T31] audit: type=1400 audit(1304.280:20033): avc: denied { read write } for pid=8459 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1304.350722][ T31] audit: type=1400 audit(1304.280:20034): avc: denied { read write open } for pid=8459 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1304.353445][ T31] audit: type=1400 audit(1304.280:20035): avc: denied { ioctl } for pid=8459 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1305.035740][ T31] audit: type=1400 audit(1304.950:20036): avc: denied { create } for pid=9124 comm="syz.0.1138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1309.166039][ T31] kauditd_printk_skb: 72 callbacks suppressed [ 1309.166141][ T31] audit: type=1400 audit(1309.090:20109): avc: denied { read write } for pid=9139 comm="syz.0.1143" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1309.167312][ T31] audit: type=1400 audit(1309.100:20110): avc: denied { bpf } for pid=9138 comm="syz.1.1144" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1309.168566][ T31] audit: type=1400 audit(1309.100:20111): avc: denied { map_read map_write } for pid=9138 comm="syz.1.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1309.173409][ T31] audit: type=1400 audit(1309.100:20112): avc: denied { read write open } for pid=9139 comm="syz.0.1143" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1309.187947][ T31] audit: type=1400 audit(1309.100:20113): avc: denied { prog_load } for pid=9138 comm="syz.1.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1309.189670][ T31] audit: type=1400 audit(1309.120:20114): avc: denied { bpf } for pid=9138 comm="syz.1.1144" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1309.193360][ T31] audit: type=1400 audit(1309.120:20115): avc: denied { prog_load } for pid=9138 comm="syz.1.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1309.203850][ T31] audit: type=1400 audit(1309.120:20116): avc: denied { bpf } for pid=9138 comm="syz.1.1144" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1309.204745][ T31] audit: type=1400 audit(1309.130:20118): avc: denied { perfmon } for pid=9138 comm="syz.1.1144" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1309.220328][ T31] audit: type=1400 audit(1309.130:20117): avc: denied { mounton } for pid=9139 comm="syz.0.1143" path="/38/file0" dev="tmpfs" ino=215 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1315.455771][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 1315.455873][ T31] audit: type=1400 audit(1315.380:20167): avc: denied { unmount } for pid=8459 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1315.525793][ T31] audit: type=1400 audit(1315.440:20168): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1315.533904][ T31] audit: type=1400 audit(1315.460:20169): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1315.567307][ T31] audit: type=1400 audit(1315.500:20170): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1315.587719][ T31] audit: type=1400 audit(1315.520:20171): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1315.627659][ T31] audit: type=1400 audit(1315.560:20172): avc: denied { read write } for pid=8459 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1315.629088][ T31] audit: type=1400 audit(1315.560:20173): avc: denied { read write open } for pid=8459 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1315.630467][ T31] audit: type=1400 audit(1315.560:20174): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1315.631143][ T31] audit: type=1400 audit(1315.560:20175): avc: denied { ioctl } for pid=8459 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1317.415486][ T31] audit: type=1400 audit(1317.340:20176): avc: denied { read write } for pid=4278 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1320.467120][ T31] kauditd_printk_skb: 88 callbacks suppressed [ 1320.467167][ T31] audit: type=1400 audit(1320.400:20265): avc: denied { read write open } for pid=8459 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1320.469601][ T31] audit: type=1400 audit(1320.400:20266): avc: denied { ioctl } for pid=8459 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1320.489159][ T31] audit: type=1400 audit(1320.420:20267): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1320.498518][ T31] audit: type=1400 audit(1320.430:20268): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1320.516180][ T31] audit: type=1400 audit(1320.440:20269): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1320.517397][ T31] audit: type=1400 audit(1320.440:20270): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1320.518278][ T31] audit: type=1400 audit(1320.440:20271): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1320.537884][ T31] audit: type=1400 audit(1320.470:20272): avc: denied { read } for pid=9178 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1320.565871][ T31] audit: type=1400 audit(1320.490:20273): avc: denied { map_create } for pid=9178 comm="syz.1.1154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1320.570060][ T31] audit: type=1400 audit(1320.500:20274): avc: denied { map_read map_write } for pid=9178 comm="syz.1.1154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1325.534423][ T31] kauditd_printk_skb: 227 callbacks suppressed [ 1325.534547][ T31] audit: type=1400 audit(1325.460:20502): avc: denied { map_create } for pid=9196 comm="syz.1.1163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1325.561599][ T31] audit: type=1400 audit(1325.490:20503): avc: denied { bpf } for pid=9196 comm="syz.1.1163" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1325.585428][ T31] audit: type=1400 audit(1325.500:20504): avc: denied { map_read map_write } for pid=9196 comm="syz.1.1163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1325.592031][ T31] audit: type=1400 audit(1325.510:20505): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1325.616358][ T31] audit: type=1400 audit(1325.530:20506): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1325.631061][ T31] audit: type=1400 audit(1325.550:20507): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1325.631905][ T31] audit: type=1400 audit(1325.560:20508): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1325.651972][ T31] audit: type=1400 audit(1325.580:20509): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1325.665520][ T31] audit: type=1400 audit(1325.590:20510): avc: denied { prog_load } for pid=9196 comm="syz.1.1163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1325.705692][ T31] audit: type=1400 audit(1325.610:20511): avc: denied { bpf } for pid=9196 comm="syz.1.1163" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1330.535962][ T31] kauditd_printk_skb: 107 callbacks suppressed [ 1330.536061][ T31] audit: type=1400 audit(1330.450:20619): avc: denied { perfmon } for pid=9210 comm="syz.0.1168" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1330.537708][ T31] audit: type=1400 audit(1330.470:20620): avc: denied { perfmon } for pid=9210 comm="syz.0.1168" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1330.538460][ T31] audit: type=1400 audit(1330.470:20621): avc: denied { bpf } for pid=9210 comm="syz.0.1168" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1330.560013][ T31] audit: type=1400 audit(1330.490:20622): avc: denied { prog_load } for pid=9210 comm="syz.0.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1330.562510][ T31] audit: type=1400 audit(1330.490:20623): avc: denied { bpf } for pid=9210 comm="syz.0.1168" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1330.595484][ T31] audit: type=1400 audit(1330.500:20624): avc: denied { module_request } for pid=9210 comm="syz.0.1168" kmod="fs-erofs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1330.625431][ T31] audit: type=1400 audit(1330.550:20625): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1330.626752][ T31] audit: type=1400 audit(1330.550:20626): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1330.645580][ T31] audit: type=1400 audit(1330.570:20627): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1330.685743][ T31] audit: type=1400 audit(1330.570:20628): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1335.639281][ T31] kauditd_printk_skb: 66 callbacks suppressed [ 1335.639358][ T31] audit: type=1400 audit(1335.570:20695): avc: denied { read write } for pid=9221 comm="syz.0.1170" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1335.648880][ T31] audit: type=1400 audit(1335.580:20696): avc: denied { read write open } for pid=9221 comm="syz.0.1170" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1335.748380][ T31] audit: type=1400 audit(1335.680:20697): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1335.751754][ T31] audit: type=1400 audit(1335.680:20698): avc: denied { mounton } for pid=9221 comm="syz.0.1170" path="/48/file0" dev="tmpfs" ino=270 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1335.754397][ T31] audit: type=1400 audit(1335.680:20699): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1335.775350][ T31] audit: type=1400 audit(1335.700:20700): avc: denied { mount } for pid=9221 comm="syz.0.1170" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1335.776498][ T31] audit: type=1400 audit(1335.700:20701): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1335.777142][ T31] audit: type=1400 audit(1335.700:20702): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1335.785847][ T31] audit: type=1400 audit(1335.700:20703): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1335.877864][ T31] audit: type=1400 audit(1335.810:20704): avc: denied { read } for pid=9223 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1342.079748][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 1342.079853][ T31] audit: type=1400 audit(1342.000:20748): avc: denied { module_request } for pid=9233 comm="syz.0.1173" kmod=6E66742D657870722D322D73F96E70726F7879 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1342.132219][ T31] audit: type=1400 audit(1342.060:20749): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1342.161487][ T31] audit: type=1400 audit(1342.090:20750): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1342.172162][ T31] audit: type=1400 audit(1342.090:20751): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1342.198409][ T31] audit: type=1400 audit(1342.130:20752): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1342.201595][ T31] audit: type=1400 audit(1342.130:20753): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1342.275476][ T31] audit: type=1400 audit(1342.200:20754): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1342.295700][ T31] audit: type=1400 audit(1342.220:20755): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1342.296769][ T31] audit: type=1400 audit(1342.220:20756): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1342.309089][ T31] audit: type=1400 audit(1342.240:20757): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1347.087589][ T31] kauditd_printk_skb: 66 callbacks suppressed [ 1347.087657][ T31] audit: type=1400 audit(1347.020:20824): avc: denied { recv } for pid=3101 comm="sshd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1347.091569][ T31] audit: type=1400 audit(1347.020:20825): avc: denied { recv } for pid=3101 comm="sshd" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1347.150993][ T31] audit: type=1400 audit(1347.080:20826): avc: denied { read write } for pid=4278 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1347.154283][ T31] audit: type=1400 audit(1347.080:20827): avc: denied { read write open } for pid=4278 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1347.176906][ T31] audit: type=1400 audit(1347.100:20828): avc: denied { ioctl } for pid=4278 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1347.182992][ T31] audit: type=1400 audit(1347.110:20829): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1347.192168][ T31] audit: type=1400 audit(1347.120:20830): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1347.218948][ T31] audit: type=1400 audit(1347.150:20831): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1347.225657][ T31] audit: type=1400 audit(1347.150:20832): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1347.229432][ T31] audit: type=1400 audit(1347.160:20833): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1348.306178][ T5491] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 1348.545804][ T5491] usb 2-1: Using ep0 maxpacket: 8 [ 1348.635490][ T5491] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1348.692135][ T5491] usb 2-1: New USB device found, idVendor=05ac, idProduct=8501, bcdDevice=20.9d [ 1348.692988][ T5491] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=105 [ 1348.693376][ T5491] usb 2-1: SerialNumber: syz [ 1348.714208][ T5491] usb 2-1: config 0 descriptor?? [ 1349.029604][ T5491] usb 2-1: USB disconnect, device number 8 [ 1352.232986][ T31] kauditd_printk_skb: 156 callbacks suppressed [ 1352.233133][ T31] audit: type=1400 audit(1352.160:20990): avc: denied { read } for pid=9274 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1352.249794][ T31] audit: type=1400 audit(1352.180:20991): avc: denied { read } for pid=9274 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1352.305795][ T31] audit: type=1400 audit(1352.220:20992): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1352.307225][ T31] audit: type=1400 audit(1352.220:20993): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1352.308049][ T31] audit: type=1400 audit(1352.240:20994): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1352.314141][ T31] audit: type=1400 audit(1352.240:20995): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1352.330496][ T31] audit: type=1400 audit(1352.260:20996): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1352.345915][ T31] audit: type=1400 audit(1352.270:20997): avc: denied { map_create } for pid=9274 comm="syz.1.1182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1352.385581][ T31] audit: type=1400 audit(1352.310:20998): avc: denied { map_read map_write } for pid=9274 comm="syz.1.1182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1352.390823][ T31] audit: type=1400 audit(1352.320:20999): avc: denied { prog_load } for pid=9274 comm="syz.1.1182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1357.435755][ T31] kauditd_printk_skb: 97 callbacks suppressed [ 1357.435861][ T31] audit: type=1400 audit(1357.350:21097): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1357.451896][ T31] audit: type=1400 audit(1357.380:21098): avc: denied { recv } for pid=3101 comm="sshd" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1357.479539][ T31] audit: type=1400 audit(1357.410:21099): avc: denied { recv } for pid=3787 comm="kworker/0:4" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1357.483411][ T31] audit: type=1400 audit(1357.410:21100): avc: denied { recv } for pid=3787 comm="kworker/0:4" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1357.488333][ T31] audit: type=1400 audit(1357.420:21101): avc: denied { recv } for pid=3787 comm="kworker/0:4" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1357.532164][ T31] audit: type=1400 audit(1357.460:21102): avc: denied { recv } for pid=3101 comm="sshd" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1357.534607][ T31] audit: type=1400 audit(1357.460:21103): avc: denied { recv } for pid=3101 comm="sshd" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1357.566450][ T31] audit: type=1400 audit(1357.480:21104): avc: denied { recv } for pid=3101 comm="sshd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1357.567433][ T31] audit: type=1400 audit(1357.490:21105): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1357.568176][ T31] audit: type=1400 audit(1357.490:21106): avc: denied { recv } for pid=3101 comm="sshd" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1365.483787][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 1365.483985][ T31] audit: type=1400 audit(1365.410:21133): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1365.495961][ T31] audit: type=1400 audit(1365.420:21134): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1365.496611][ T31] audit: type=1400 audit(1365.430:21135): avc: denied { recv } for pid=3101 comm="sshd" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1365.497189][ T31] audit: type=1400 audit(1365.430:21136): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1365.502501][ T31] audit: type=1400 audit(1365.430:21137): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1365.508051][ T31] audit: type=1400 audit(1365.440:21138): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1365.520871][ T31] audit: type=1400 audit(1365.450:21139): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1365.535625][ T31] audit: type=1400 audit(1365.460:21140): avc: denied { recv } for pid=3101 comm="sshd" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1365.536113][ T31] audit: type=1400 audit(1365.460:21141): avc: denied { recv } for pid=3101 comm="sshd" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1365.545731][ T31] audit: type=1400 audit(1365.470:21142): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1370.749383][ T31] kauditd_printk_skb: 149 callbacks suppressed [ 1370.749475][ T31] audit: type=1400 audit(1370.680:21292): avc: denied { read write } for pid=8459 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1370.767477][ T31] audit: type=1400 audit(1370.700:21293): avc: denied { read write open } for pid=8459 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1370.770965][ T31] audit: type=1400 audit(1370.700:21294): avc: denied { ioctl } for pid=8459 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1370.800282][ T31] audit: type=1400 audit(1370.730:21295): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1370.829328][ T31] audit: type=1400 audit(1370.760:21296): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1370.832607][ T31] audit: type=1400 audit(1370.760:21297): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1370.839606][ T31] audit: type=1400 audit(1370.770:21298): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1370.865897][ T31] audit: type=1400 audit(1370.790:21299): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1371.504021][ T31] audit: type=1400 audit(1371.430:21300): avc: denied { read write } for pid=9322 comm="syz.0.1198" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1371.520199][ T31] audit: type=1400 audit(1371.450:21301): avc: denied { read write open } for pid=9322 comm="syz.0.1198" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1376.009067][ T31] kauditd_printk_skb: 109 callbacks suppressed [ 1376.009168][ T31] audit: type=1400 audit(1375.910:21411): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1376.010162][ T31] audit: type=1400 audit(1375.930:21412): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1376.029260][ T31] audit: type=1400 audit(1375.950:21413): avc: denied { recv } for pid=7672 comm="kworker/0:2" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1376.063825][ T31] audit: type=1400 audit(1375.990:21414): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1376.066325][ T31] audit: type=1400 audit(1375.990:21415): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1376.084593][ T31] audit: type=1400 audit(1376.010:21416): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1376.101765][ T31] audit: type=1400 audit(1376.030:21417): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1376.129353][ T31] audit: type=1400 audit(1376.060:21418): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1376.134334][ T31] audit: type=1400 audit(1376.060:21419): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1376.155551][ T31] audit: type=1400 audit(1376.080:21420): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1381.032595][ T31] kauditd_printk_skb: 92 callbacks suppressed [ 1381.032712][ T31] audit: type=1400 audit(1380.960:21513): avc: denied { prog_load } for pid=9347 comm="syz.0.1207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1381.058447][ T31] audit: type=1400 audit(1380.990:21514): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1381.075766][ T31] audit: type=1400 audit(1381.000:21515): avc: denied { bpf } for pid=9347 comm="syz.0.1207" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1381.078420][ T31] audit: type=1400 audit(1381.000:21516): avc: denied { perfmon } for pid=9347 comm="syz.0.1207" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1381.117741][ T31] audit: type=1400 audit(1381.020:21517): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1381.118573][ T31] audit: type=1400 audit(1381.020:21518): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1381.119233][ T31] audit: type=1400 audit(1381.020:21519): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1381.119962][ T31] audit: type=1400 audit(1381.040:21520): avc: denied { perfmon } for pid=9347 comm="syz.0.1207" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1381.120632][ T31] audit: type=1400 audit(1381.040:21521): avc: denied { perfmon } for pid=9347 comm="syz.0.1207" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1381.121342][ T31] audit: type=1400 audit(1381.050:21522): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1396.823970][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 1396.824062][ T31] audit: type=1400 audit(1396.750:21538): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1396.825938][ T31] audit: type=1400 audit(1396.750:21539): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1396.851622][ T31] audit: type=1400 audit(1396.780:21540): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1396.852556][ T31] audit: type=1400 audit(1396.780:21541): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1396.872428][ T31] audit: type=1400 audit(1396.800:21542): avc: denied { recv } for pid=4278 comm="syz-executor" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1396.873530][ T31] audit: type=1400 audit(1396.800:21543): avc: denied { recv } for pid=4278 comm="syz-executor" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1396.889554][ T31] audit: type=1400 audit(1396.820:21544): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1396.894826][ T31] audit: type=1400 audit(1396.820:21545): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1396.924578][ T31] audit: type=1400 audit(1396.850:21546): avc: denied { read write } for pid=4278 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1396.937790][ T31] audit: type=1400 audit(1396.870:21547): avc: denied { read write open } for pid=4278 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1402.170588][ T31] kauditd_printk_skb: 97 callbacks suppressed [ 1402.170706][ T31] audit: type=1400 audit(1402.090:21645): avc: denied { prog_load } for pid=9357 comm="syz.0.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1402.197659][ T31] audit: type=1400 audit(1402.130:21646): avc: denied { bpf } for pid=9357 comm="syz.0.1211" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1402.208470][ T31] audit: type=1400 audit(1402.140:21647): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1402.212471][ T31] audit: type=1400 audit(1402.140:21648): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1402.225909][ T31] audit: type=1400 audit(1402.140:21649): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1402.226806][ T31] audit: type=1400 audit(1402.140:21650): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1402.228953][ T31] audit: type=1400 audit(1402.150:21651): avc: denied { prog_load } for pid=9357 comm="syz.0.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1402.230400][ T31] audit: type=1400 audit(1402.150:21652): avc: denied { bpf } for pid=9357 comm="syz.0.1211" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1402.255723][ T31] audit: type=1400 audit(1402.170:21653): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1402.405982][ T31] audit: type=1400 audit(1402.330:21654): avc: denied { execmem } for pid=9357 comm="syz.0.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1407.951275][ T31] audit: type=1400 audit(1407.880:21655): avc: denied { prog_load } for pid=9355 comm="syz.1.1210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1407.981482][ T31] audit: type=1400 audit(1407.900:21656): avc: denied { bpf } for pid=9355 comm="syz.1.1210" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1408.013994][ T31] audit: type=1400 audit(1407.930:21657): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1408.058764][ T31] audit: type=1400 audit(1407.990:21658): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1408.068801][ T31] audit: type=1400 audit(1408.000:21659): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1408.072614][ T31] audit: type=1400 audit(1408.000:21660): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1408.106279][ T31] audit: type=1400 audit(1408.020:21661): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1408.113983][ T31] audit: type=1400 audit(1408.040:21662): avc: denied { read } for pid=9355 comm="syz.1.1210" dev="nsfs" ino=4026532973 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1408.147434][ T31] audit: type=1400 audit(1408.080:21663): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1408.155744][ T31] audit: type=1400 audit(1408.080:21664): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1412.998695][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 1412.998787][ T31] audit: type=1400 audit(1412.930:21699): avc: denied { module_request } for pid=9357 comm="syz.0.1211" kmod="crypto-cbc(des)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1413.059426][ T31] audit: type=1400 audit(1412.990:21700): avc: denied { module_request } for pid=9357 comm="syz.0.1211" kmod="cryptomgr" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1413.129351][ T31] audit: type=1400 audit(1413.040:21701): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1413.130361][ T31] audit: type=1400 audit(1413.040:21702): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1413.186272][ T31] audit: type=1400 audit(1413.110:21703): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1413.195597][ T31] audit: type=1400 audit(1413.110:21704): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1413.196293][ T31] audit: type=1400 audit(1413.110:21705): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1413.332403][ T31] audit: type=1400 audit(1413.260:21706): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1413.341868][ T31] audit: type=1400 audit(1413.270:21707): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1413.389495][ T31] audit: type=1400 audit(1413.320:21708): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1429.627121][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 1429.627207][ T31] audit: type=1400 audit(1429.560:21738): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1429.647814][ T31] audit: type=1400 audit(1429.580:21739): avc: denied { recv } for pid=9357 comm="syz.0.1211" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1429.662378][ T31] audit: type=1400 audit(1429.590:21740): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1429.680483][ T31] audit: type=1400 audit(1429.610:21741): avc: denied { recv } for pid=23 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1429.691463][ T31] audit: type=1400 audit(1429.620:21742): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1429.708901][ T31] audit: type=1400 audit(1429.640:21743): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1429.725549][ T31] audit: type=1400 audit(1429.650:21744): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1429.730366][ T31] audit: type=1400 audit(1429.660:21745): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1429.785465][ T31] audit: type=1400 audit(1429.700:21746): avc: denied { execute } for pid=9427 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1429.808696][ T31] audit: type=1400 audit(1429.740:21747): avc: denied { execute_no_trans } for pid=9427 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1432.892033][ T9359] syz_tun (unregistering): left promiscuous mode [ 1433.244354][ T7842] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1433.341347][ T7842] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1433.439359][ T7842] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1433.516061][ T7842] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1434.050362][ T7842] bond1 (unregistering): (slave ip6gretap1): Releasing active interface [ 1434.177165][ T7842] gretap0 (unregistering): left promiscuous mode [ 1434.249756][ T7842] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1434.276652][ T7842] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1434.286041][ T7842] bond0 (unregistering): Released all slaves [ 1434.357258][ T7842] bond1 (unregistering): Released all slaves [ 1434.469699][ T7842] batadv_slave_1: left promiscuous mode [ 1434.506081][ T7842] hsr_slave_0: left promiscuous mode [ 1434.522722][ T7842] hsr_slave_1: left promiscuous mode [ 1434.566770][ T7842] veth1_macvtap: left promiscuous mode [ 1434.567331][ T7842] veth0_macvtap: left promiscuous mode [ 1434.567892][ T7842] veth1_vlan: left promiscuous mode [ 1434.568258][ T7842] veth0_vlan: left promiscuous mode [ 1435.253832][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 1435.253923][ T31] audit: type=1400 audit(1435.180:21792): avc: denied { sys_module } for pid=9432 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1435.260427][ T31] audit: type=1400 audit(1435.190:21793): avc: denied { module_request } for pid=9432 comm="syz-executor" kmod="nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1435.272740][ T31] audit: type=1400 audit(1435.200:21794): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1435.289367][ T31] audit: type=1400 audit(1435.220:21795): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1435.291243][ T31] audit: type=1400 audit(1435.220:21796): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1435.294456][ T31] audit: type=1400 audit(1435.220:21797): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1435.315327][ T31] audit: type=1400 audit(1435.240:21798): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1435.338255][ T31] audit: type=1400 audit(1435.270:21799): avc: denied { module_request } for pid=9428 comm="syz-executor" kmod="netdev-rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1435.780208][ T7842] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1435.836138][ T31] audit: type=1400 audit(1435.760:21800): avc: denied { module_request } for pid=9432 comm="syz-executor" kmod="netdev-rose0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1435.906768][ T7842] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1435.968141][ T7842] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1436.010259][ T31] audit: type=1400 audit(1435.940:21801): avc: denied { sys_module } for pid=9428 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1436.068568][ T7842] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1436.629659][ T7842] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1436.642635][ T7842] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1436.648389][ T7842] bond0 (unregistering): Released all slaves [ 1436.854332][ T7842] hsr_slave_0: left promiscuous mode [ 1436.857573][ T7842] hsr_slave_1: left promiscuous mode [ 1436.876548][ T7842] veth1_macvtap: left promiscuous mode [ 1436.877119][ T7842] veth0_macvtap: left promiscuous mode [ 1436.877550][ T7842] veth1_vlan: left promiscuous mode [ 1436.877930][ T7842] veth0_vlan: left promiscuous mode [ 1440.584820][ T31] kauditd_printk_skb: 173 callbacks suppressed [ 1440.586114][ T31] audit: type=1400 audit(1440.510:21975): avc: denied { module_request } for pid=9432 comm="syz-executor" kmod="rtnl-link-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1440.612673][ T31] audit: type=1400 audit(1440.540:21976): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1440.685576][ T31] audit: type=1400 audit(1440.610:21977): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1440.695219][ T31] audit: type=1400 audit(1440.620:21978): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1440.699880][ T31] audit: type=1400 audit(1440.620:21979): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1440.700655][ T31] audit: type=1400 audit(1440.630:21980): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1440.799019][ T31] audit: type=1400 audit(1440.690:21981): avc: denied { module_request } for pid=9428 comm="syz-executor" kmod="rtnl-link-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1441.105792][ T31] audit: type=1400 audit(1441.030:21982): avc: denied { search } for pid=9529 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1441.109667][ T31] audit: type=1400 audit(1441.040:21983): avc: denied { read } for pid=9529 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1441.113207][ T31] audit: type=1400 audit(1441.040:21984): avc: denied { read open } for pid=9529 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1445.616692][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 1445.616798][ T31] audit: type=1400 audit(1445.550:22027): avc: denied { module_request } for pid=9432 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1445.634168][ T31] audit: type=1400 audit(1445.560:22028): avc: denied { write } for pid=9719 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1445.656275][ T31] audit: type=1400 audit(1445.580:22029): avc: denied { write open } for pid=9719 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1445.657608][ T31] audit: type=1400 audit(1445.580:22030): avc: denied { getattr } for pid=9719 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1445.685685][ T31] audit: type=1400 audit(1445.600:22031): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1445.686633][ T31] audit: type=1400 audit(1445.600:22032): avc: denied { ioctl } for pid=9719 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1445.687472][ T31] audit: type=1400 audit(1445.600:22033): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1445.697780][ T31] audit: type=1400 audit(1445.630:22034): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1445.701931][ T31] audit: type=1400 audit(1445.630:22035): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1445.715505][ T31] audit: type=1400 audit(1445.640:22036): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1447.528295][ T9432] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1447.567334][ T9432] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1447.928698][ T9428] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1447.968351][ T9428] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1450.864144][ T31] kauditd_printk_skb: 200 callbacks suppressed [ 1450.864266][ T31] audit: type=1400 audit(1450.790:22237): avc: denied { search } for pid=9858 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1450.885489][ T31] audit: type=1400 audit(1450.810:22238): avc: denied { search } for pid=9858 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1450.886400][ T31] audit: type=1400 audit(1450.810:22239): avc: denied { search } for pid=9858 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1450.902876][ T31] audit: type=1400 audit(1450.830:22240): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1450.903794][ T31] audit: type=1400 audit(1450.830:22241): avc: denied { sys_module } for pid=9432 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1450.916266][ T31] audit: type=1400 audit(1450.840:22242): avc: denied { module_request } for pid=9432 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1450.934189][ T31] audit: type=1400 audit(1450.860:22243): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1450.947993][ T31] audit: type=1400 audit(1450.880:22244): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1450.950860][ T31] audit: type=1400 audit(1450.880:22245): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1450.955555][ T31] audit: type=1400 audit(1450.880:22246): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1453.500468][ T9432] hsr_slave_0: entered promiscuous mode [ 1453.503425][ T9432] hsr_slave_1: entered promiscuous mode [ 1454.726724][ T9428] hsr_slave_0: entered promiscuous mode [ 1454.732289][ T9428] hsr_slave_1: entered promiscuous mode [ 1454.735660][ T9428] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1454.735908][ T9428] Cannot create hsr debugfs directory [ 1455.612087][ T9432] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1455.640577][ T9432] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1455.707473][ T9432] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1455.721226][ T9432] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1455.942338][ T31] kauditd_printk_skb: 218 callbacks suppressed [ 1455.942412][ T31] audit: type=1400 audit(1455.870:22465): avc: denied { search } for pid=10033 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1455.945261][ T31] audit: type=1400 audit(1455.870:22466): avc: denied { read } for pid=10033 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1455.946112][ T31] audit: type=1400 audit(1455.880:22467): avc: denied { read open } for pid=10033 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1455.952649][ T31] audit: type=1400 audit(1455.880:22468): avc: denied { search } for pid=10033 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1455.958509][ T31] audit: type=1400 audit(1455.890:22469): avc: denied { search } for pid=10033 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1455.962730][ T31] audit: type=1400 audit(1455.890:22470): avc: denied { search } for pid=10033 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1455.964519][ T31] audit: type=1400 audit(1455.890:22471): avc: denied { read } for pid=10033 comm="cmp" name="resolv.conf.eth3.link" dev="tmpfs" ino=68 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1455.977841][ T31] audit: type=1400 audit(1455.900:22472): avc: denied { read open } for pid=10033 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=68 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1455.978452][ T31] audit: type=1400 audit(1455.900:22473): avc: denied { getattr } for pid=10033 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1455.978934][ T31] audit: type=1400 audit(1455.900:22474): avc: denied { getattr } for pid=10033 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=68 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1456.694837][ T9428] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1456.732167][ T9428] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1456.758184][ T9428] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1456.798889][ T9428] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1460.836942][ T9432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1460.949716][ T31] kauditd_printk_skb: 103 callbacks suppressed [ 1460.949836][ T31] audit: type=1400 audit(1460.880:22578): avc: denied { getattr } for pid=10131 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1460.976686][ T31] audit: type=1400 audit(1460.910:22579): avc: denied { search } for pid=10131 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1460.981242][ T31] audit: type=1400 audit(1460.910:22580): avc: denied { search } for pid=10131 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1460.996004][ T31] audit: type=1400 audit(1460.920:22581): avc: denied { search } for pid=10131 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1461.000681][ T31] audit: type=1400 audit(1460.930:22582): avc: denied { search } for pid=10131 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1461.025490][ T31] audit: type=1400 audit(1460.950:22583): avc: denied { search } for pid=10131 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1461.045908][ T31] audit: type=1400 audit(1460.970:22584): avc: denied { search } for pid=10131 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1461.046911][ T31] audit: type=1400 audit(1460.970:22585): avc: denied { search } for pid=10131 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1461.047738][ T31] audit: type=1400 audit(1460.970:22586): avc: denied { module_request } for pid=9432 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1461.075796][ T31] audit: type=1400 audit(1460.990:22587): avc: denied { read } for pid=10131 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1461.812212][ T9428] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1465.962514][ T31] kauditd_printk_skb: 208 callbacks suppressed [ 1465.962599][ T31] audit: type=1400 audit(1465.890:22796): avc: denied { getattr } for pid=10148 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1465.991491][ T31] audit: type=1400 audit(1465.910:22797): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1466.004668][ T31] audit: type=1400 audit(1465.930:22798): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1466.006347][ T31] audit: type=1400 audit(1465.930:22799): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1466.015564][ T31] audit: type=1400 audit(1465.930:22800): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1466.018826][ T31] audit: type=1400 audit(1465.950:22801): avc: denied { search } for pid=10148 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1466.029012][ T31] audit: type=1400 audit(1465.960:22802): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1466.033457][ T31] audit: type=1400 audit(1465.960:22803): avc: denied { search } for pid=10148 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1466.061157][ T31] audit: type=1400 audit(1465.980:22804): avc: denied { search } for pid=10148 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1466.075356][ T31] audit: type=1400 audit(1466.000:22805): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1471.109070][ T31] kauditd_printk_skb: 177 callbacks suppressed [ 1471.109172][ T31] audit: type=1400 audit(1471.040:22983): avc: denied { write } for pid=10164 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1471.110775][ T31] audit: type=1400 audit(1471.040:22984): avc: denied { write open } for pid=10164 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1471.113465][ T31] audit: type=1400 audit(1471.040:22985): avc: denied { getattr } for pid=10164 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1471.115651][ T31] audit: type=1400 audit(1471.040:22986): avc: denied { ioctl } for pid=10164 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1471.135638][ T31] audit: type=1400 audit(1471.060:22987): avc: denied { search } for pid=10164 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1471.136806][ T31] audit: type=1400 audit(1471.070:22988): avc: denied { search } for pid=10164 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1471.142082][ T31] audit: type=1400 audit(1471.070:22989): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1471.142943][ T31] audit: type=1400 audit(1471.070:22990): avc: denied { search } for pid=10164 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1471.146779][ T31] audit: type=1400 audit(1471.080:22991): avc: denied { search } for pid=10164 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1471.165451][ T31] audit: type=1400 audit(1471.090:22992): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1476.120096][ T31] kauditd_printk_skb: 235 callbacks suppressed [ 1476.120213][ T31] audit: type=1400 audit(1476.050:23228): avc: denied { search } for pid=10186 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1476.122158][ T31] audit: type=1400 audit(1476.050:23229): avc: denied { search } for pid=10186 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1476.123684][ T31] audit: type=1400 audit(1476.050:23230): avc: denied { search } for pid=10186 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1476.138363][ T31] audit: type=1400 audit(1476.070:23231): avc: denied { read } for pid=10186 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1476.139980][ T31] audit: type=1400 audit(1476.070:23232): avc: denied { read open } for pid=10186 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1476.142300][ T31] audit: type=1400 audit(1476.070:23233): avc: denied { getattr } for pid=10186 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1476.160385][ T31] audit: type=1400 audit(1476.090:23234): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1476.163382][ T31] audit: type=1400 audit(1476.090:23235): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1476.175784][ T31] audit: type=1400 audit(1476.100:23236): avc: denied { search } for pid=10186 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1476.185429][ T31] audit: type=1400 audit(1476.110:23237): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1481.126802][ T31] kauditd_printk_skb: 186 callbacks suppressed [ 1481.126885][ T31] audit: type=1400 audit(1481.060:23424): avc: denied { search } for pid=10203 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1481.149610][ T31] audit: type=1400 audit(1481.080:23425): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1481.153228][ T31] audit: type=1400 audit(1481.080:23426): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1481.167308][ T31] audit: type=1400 audit(1481.100:23427): avc: denied { search } for pid=10203 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1481.169677][ T31] audit: type=1400 audit(1481.100:23428): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1481.170269][ T31] audit: type=1400 audit(1481.100:23429): avc: denied { search } for pid=10203 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1481.175418][ T31] audit: type=1400 audit(1481.100:23430): avc: denied { search } for pid=10203 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1481.194329][ T31] audit: type=1400 audit(1481.110:23431): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1481.195968][ T31] audit: type=1400 audit(1481.120:23432): avc: denied { read } for pid=10203 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1481.197368][ T31] audit: type=1400 audit(1481.120:23433): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1482.730732][ T9432] veth0_vlan: entered promiscuous mode [ 1482.860523][ T9432] veth1_vlan: entered promiscuous mode [ 1483.143869][ T9432] veth0_macvtap: entered promiscuous mode [ 1483.239278][ T9432] veth1_macvtap: entered promiscuous mode [ 1483.471150][ T9428] veth0_vlan: entered promiscuous mode [ 1483.519742][ T9432] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1483.520224][ T9432] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1483.520517][ T9432] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1483.520797][ T9432] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1483.564190][ T9428] veth1_vlan: entered promiscuous mode [ 1484.113495][ T9428] veth0_macvtap: entered promiscuous mode [ 1484.173144][ T9428] veth1_macvtap: entered promiscuous mode [ 1484.531074][ T9428] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1484.531593][ T9428] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1484.531930][ T9428] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1484.532245][ T9428] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1486.339462][ T31] kauditd_printk_skb: 213 callbacks suppressed [ 1486.339565][ T31] audit: type=1400 audit(1486.270:23647): avc: denied { write } for pid=10214 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1486.342418][ T31] audit: type=1400 audit(1486.270:23648): avc: denied { write open } for pid=10214 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1486.365882][ T31] audit: type=1400 audit(1486.280:23649): avc: denied { read write } for pid=10215 comm="syz.1.1212" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1486.366913][ T31] audit: type=1400 audit(1486.290:23650): avc: denied { getattr } for pid=10214 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1486.375429][ T31] audit: type=1400 audit(1486.300:23651): avc: denied { ioctl } for pid=10214 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1486.376808][ T31] audit: type=1400 audit(1486.310:23652): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1486.382610][ T31] audit: type=1400 audit(1486.310:23653): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1486.389613][ T31] audit: type=1400 audit(1486.320:23654): avc: denied { read write open } for pid=10215 comm="syz.1.1212" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1486.402402][ T31] audit: type=1400 audit(1486.330:23655): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1486.422072][ T31] audit: type=1400 audit(1486.350:23656): avc: denied { mounton } for pid=10215 comm="syz.1.1212" path="/0/file0" dev="tmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1491.511280][ T31] kauditd_printk_skb: 214 callbacks suppressed [ 1491.511358][ T31] audit: type=1400 audit(1491.440:23871): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1491.545411][ T31] audit: type=1400 audit(1491.460:23872): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1491.546401][ T31] audit: type=1400 audit(1491.470:23873): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1491.558189][ T31] audit: type=1400 audit(1491.490:23874): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1491.576385][ T31] audit: type=1400 audit(1491.510:23875): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1491.815900][ T31] audit: type=1400 audit(1491.740:23876): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1491.819884][ T31] audit: type=1400 audit(1491.750:23877): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1491.874491][ T31] audit: type=1400 audit(1491.780:23878): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1491.876054][ T31] audit: type=1400 audit(1491.800:23879): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1491.877257][ T31] audit: type=1400 audit(1491.800:23880): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1492.770098][T10229] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1492.970367][T10229] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1493.113815][T10229] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1493.286907][T10229] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1493.490541][T10229] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1493.507235][T10229] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1493.546767][T10229] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1493.591671][T10229] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1496.529259][ T31] kauditd_printk_skb: 234 callbacks suppressed [ 1496.529338][ T31] audit: type=1400 audit(1496.460:24115): avc: denied { create } for pid=10259 comm="syz.1.1220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1496.589968][ T31] audit: type=1400 audit(1496.510:24116): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1496.615503][ T31] audit: type=1400 audit(1496.530:24117): avc: denied { bind } for pid=10259 comm="syz.1.1220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1496.648619][ T31] audit: type=1400 audit(1496.530:24118): avc: denied { node_bind } for pid=10259 comm="syz.1.1220" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1496.670130][ T31] audit: type=1400 audit(1496.530:24119): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1496.670921][ T31] audit: type=1400 audit(1496.540:24120): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1496.671597][ T31] audit: type=1400 audit(1496.540:24121): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1496.672302][ T31] audit: type=1400 audit(1496.560:24122): avc: denied { write } for pid=10259 comm="syz.1.1220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1496.677842][ T31] audit: type=1400 audit(1496.570:24123): avc: denied { recv } for pid=10259 comm="syz.1.1220" saddr=127.0.0.1 daddr=127.0.0.1 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1496.678971][ T31] audit: type=1400 audit(1496.570:24124): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1498.379624][T10268] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1498.467684][T10268] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1498.558471][T10268] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1498.620264][T10268] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1498.744577][T10268] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1498.778873][T10268] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1498.828265][T10268] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1498.851544][T10268] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1501.591425][ T31] kauditd_printk_skb: 204 callbacks suppressed [ 1501.591523][ T31] audit: type=1400 audit(1501.520:24329): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1501.596257][ T31] audit: type=1400 audit(1501.520:24330): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1501.615855][ T31] audit: type=1400 audit(1501.550:24331): avc: denied { recv } for pid=9428 comm="syz-executor" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1501.628309][ T31] audit: type=1400 audit(1501.560:24332): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1501.635325][ T31] audit: type=1400 audit(1501.560:24333): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1501.638180][ T31] audit: type=1400 audit(1501.570:24334): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1501.641212][ T31] audit: type=1400 audit(1501.570:24335): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1501.650872][ T31] audit: type=1400 audit(1501.580:24337): avc: denied { recv } for pid=9428 comm="syz-executor" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1501.652284][ T31] audit: type=1400 audit(1501.580:24338): avc: denied { recv } for pid=9428 comm="syz-executor" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1501.685501][ T31] audit: type=1400 audit(1501.570:24336): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1502.840837][T10299] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1506.614355][ T31] kauditd_printk_skb: 120 callbacks suppressed [ 1506.614454][ T31] audit: type=1400 audit(1506.540:24459): avc: denied { map_read map_write } for pid=10298 comm="syz.0.1229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1506.641000][ T31] audit: type=1400 audit(1506.570:24460): avc: denied { prog_load } for pid=10298 comm="syz.0.1229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1506.651604][ T31] audit: type=1400 audit(1506.580:24461): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1506.688154][ T31] audit: type=1400 audit(1506.620:24462): avc: denied { search } for pid=2922 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1506.689084][ T31] audit: type=1400 audit(1506.620:24463): avc: denied { bpf } for pid=10298 comm="syz.0.1229" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1506.689755][ T31] audit: type=1400 audit(1506.620:24464): avc: denied { append } for pid=2922 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1506.696822][ T31] audit: type=1400 audit(1506.620:24465): avc: denied { append open } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1506.715503][ T31] audit: type=1400 audit(1506.640:24466): avc: denied { getattr } for pid=2922 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1506.721638][ T31] audit: type=1400 audit(1506.650:24467): avc: denied { prog_load } for pid=10298 comm="syz.0.1229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1506.741442][ T31] audit: type=1400 audit(1506.670:24468): avc: denied { bpf } for pid=10298 comm="syz.0.1229" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1521.634013][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 1521.634137][ T31] audit: type=1400 audit(1521.560:24489): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1521.659631][ T31] audit: type=1400 audit(1521.590:24490): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1521.688172][ T31] audit: type=1400 audit(1521.620:24491): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1521.715494][ T31] audit: type=1400 audit(1521.630:24492): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1521.716679][ T31] audit: type=1400 audit(1521.630:24493): avc: denied { recv } for pid=15 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1521.717538][ T31] audit: type=1400 audit(1521.640:24494): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1521.727816][ T31] audit: type=1400 audit(1521.660:24495): avc: denied { recv } for pid=9428 comm="syz-executor" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1521.730509][ T31] audit: type=1400 audit(1521.660:24496): avc: denied { recv } for pid=9428 comm="syz-executor" saddr=10.0.2.2 src=49662 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1521.766345][ T31] audit: type=1400 audit(1521.690:24497): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1521.767450][ T31] audit: type=1400 audit(1521.690:24498): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=47962 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1526.743241][ T31] kauditd_printk_skb: 200 callbacks suppressed [ 1526.743327][ T31] audit: type=1400 audit(1526.670:24699): avc: denied { prog_load } for pid=10331 comm="syz.0.1244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1526.746749][ T31] audit: type=1400 audit(1526.680:24700): avc: denied { bpf } for pid=10331 comm="syz.0.1244" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1526.749995][ T31] audit: type=1400 audit(1526.680:24701): avc: denied { perfmon } for pid=10331 comm="syz.0.1244" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1526.753380][ T31] audit: type=1400 audit(1526.680:24702): avc: denied { perfmon } for pid=10331 comm="syz.0.1244" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1526.756845][ T31] audit: type=1400 audit(1526.690:24703): avc: denied { perfmon } for pid=10331 comm="syz.0.1244" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1526.759720][ T31] audit: type=1400 audit(1526.690:24704): avc: denied { perfmon } for pid=10331 comm="syz.0.1244" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1526.772994][ T31] audit: type=1400 audit(1526.690:24705): avc: denied { perfmon } for pid=10331 comm="syz.0.1244" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1526.773777][ T31] audit: type=1400 audit(1526.700:24706): avc: denied { bpf } for pid=10331 comm="syz.0.1244" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1526.774335][ T31] audit: type=1400 audit(1526.700:24707): avc: denied { read } for pid=2922 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1526.783037][ T31] audit: type=1400 audit(1526.700:24708): avc: denied { bpf } for pid=10331 comm="syz.0.1244" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1528.221199][T10349] syzkaller0: entered allmulticast mode [ 1531.208999][T10365] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 1532.008627][ T31] kauditd_printk_skb: 200 callbacks suppressed [ 1532.008792][ T31] audit: type=1400 audit(1531.940:24909): avc: denied { sys_module } for pid=10356 comm="syz.0.1249" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1532.032931][ T31] audit: type=1400 audit(1531.960:24910): avc: denied { module_request } for pid=10356 comm="syz.0.1249" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1532.245511][ T31] audit: type=1400 audit(1532.170:24911): avc: denied { map_create } for pid=10368 comm="syz.1.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1532.266060][ T31] audit: type=1400 audit(1532.190:24912): avc: denied { bpf } for pid=10368 comm="syz.1.1252" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1532.268115][ T31] audit: type=1400 audit(1532.190:24913): avc: denied { map_read map_write } for pid=10368 comm="syz.1.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1532.285973][ T31] audit: type=1400 audit(1532.210:24914): avc: denied { prog_load } for pid=10368 comm="syz.1.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1532.295338][ T31] audit: type=1400 audit(1532.220:24915): avc: denied { bpf } for pid=10368 comm="syz.1.1252" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1532.389977][ T31] audit: type=1400 audit(1532.310:24916): avc: denied { perfmon } for pid=10368 comm="syz.1.1252" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1532.404534][ T31] audit: type=1400 audit(1532.330:24917): avc: denied { perfmon } for pid=10368 comm="syz.1.1252" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1532.436170][ T31] audit: type=1400 audit(1532.350:24918): avc: denied { recv } for pid=3103 comm="syz-executor" saddr=127.0.0.1 src=47962 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1537.015781][ T31] kauditd_printk_skb: 176 callbacks suppressed [ 1537.015884][ T31] audit: type=1400 audit(1536.940:25095): avc: denied { bpf } for pid=10385 comm="syz.1.1260" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1537.017555][ T31] audit: type=1400 audit(1536.940:25096): avc: denied { perfmon } for pid=10385 comm="syz.1.1260" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1537.018304][ T31] audit: type=1400 audit(1536.940:25097): avc: denied { perfmon } for pid=10385 comm="syz.1.1260" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1537.019060][ T31] audit: type=1400 audit(1536.950:25098): avc: denied { perfmon } for pid=10385 comm="syz.1.1260" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1537.020699][ T31] audit: type=1400 audit(1536.950:25099): avc: denied { perfmon } for pid=10385 comm="syz.1.1260" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1537.023994][ T31] audit: type=1400 audit(1536.950:25100): avc: denied { perfmon } for pid=10385 comm="syz.1.1260" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1537.032191][ T31] audit: type=1400 audit(1536.960:25101): avc: denied { bpf } for pid=10385 comm="syz.1.1260" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1537.045311][ T31] audit: type=1400 audit(1536.970:25102): avc: denied { bpf } for pid=10385 comm="syz.1.1260" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1537.046223][ T31] audit: type=1400 audit(1536.970:25103): avc: denied { read write } for pid=9432 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1537.050407][ T31] audit: type=1400 audit(1536.980:25104): avc: denied { prog_run } for pid=10385 comm="syz.1.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1542.174675][ T31] kauditd_printk_skb: 161 callbacks suppressed [ 1542.175918][ T31] audit: type=1400 audit(1542.100:25266): avc: denied { search } for pid=10403 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1542.189565][ T31] audit: type=1400 audit(1542.120:25267): avc: denied { search } for pid=10403 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1542.193485][ T31] audit: type=1400 audit(1542.120:25268): avc: denied { search } for pid=10403 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1542.216178][ T31] audit: type=1400 audit(1542.140:25269): avc: denied { read } for pid=10403 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1542.221050][ T31] audit: type=1400 audit(1542.140:25270): avc: denied { read open } for pid=10403 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1542.245554][ T31] audit: type=1400 audit(1542.140:25271): avc: denied { getattr } for pid=10403 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1542.246765][ T31] audit: type=1326 audit(1542.140:25272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10402 comm="syz.0.1267" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1542.247510][ T31] audit: type=1326 audit(1542.160:25273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10402 comm="syz.0.1267" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1542.248060][ T31] audit: type=1326 audit(1542.160:25274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10402 comm="syz.0.1267" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 1542.248504][ T31] audit: type=1400 audit(1542.160:25275): avc: denied { map_create } for pid=10402 comm="syz.0.1267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1547.448922][ T31] kauditd_printk_skb: 265 callbacks suppressed [ 1547.449003][ T31] audit: type=1400 audit(1547.380:25541): avc: denied { search } for pid=10418 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1547.451546][ T31] audit: type=1400 audit(1547.380:25542): avc: denied { search } for pid=10418 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1547.466642][ T31] audit: type=1400 audit(1547.400:25543): avc: denied { search } for pid=10418 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1547.475717][ T31] audit: type=1400 audit(1547.400:25544): avc: denied { getattr } for pid=10418 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=76 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1547.511825][ T31] audit: type=1400 audit(1547.420:25545): avc: denied { search } for pid=10418 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1547.512595][ T31] audit: type=1400 audit(1547.420:25546): avc: denied { search } for pid=10418 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1547.513299][ T31] audit: type=1400 audit(1547.440:25547): avc: denied { search } for pid=10418 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1547.513859][ T31] audit: type=1400 audit(1547.440:25548): avc: denied { write search } for pid=10418 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1547.514522][ T31] audit: type=1400 audit(1547.440:25549): avc: denied { remove_name search } for pid=10418 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=76 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1547.529607][ T31] audit: type=1400 audit(1547.460:25550): avc: denied { unlink } for pid=10418 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=76 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1548.006573][ T7677] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 1548.332566][ T7677] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1548.425577][ T7677] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1548.426093][ T7677] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1548.426352][ T7677] usb 2-1: Product: syz [ 1548.426514][ T7677] usb 2-1: Manufacturer: syz [ 1548.426684][ T7677] usb 2-1: SerialNumber: syz [ 1549.827277][ T7677] cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 1549.827854][ T7677] cdc_ncm 2-1:1.0: dwNtbInMaxSize=16 is too small. Using 2048 [ 1549.828172][ T7677] cdc_ncm 2-1:1.0: setting rx_max = 2048 [ 1550.047763][ T7677] cdc_ncm 2-1:1.0: setting tx_max = 88 [ 1550.068345][ T7677] cdc_ncm 2-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 1550.083944][ T7677] usb 2-1: USB disconnect, device number 9 [ 1550.085393][ T7677] cdc_ncm 2-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM (NO ZLP) [ 1550.278184][ T7677] ------------[ cut here ]------------ [ 1550.278677][ T7677] WARNING: CPU: 0 PID: 7677 at lib/debugobjects.c:515 debug_print_object+0xc4/0xd8 [ 1550.279110][ T7677] ODEBUG: free active (active state 0) object: 852ed7cc object type: work_struct hint: usbnet_deferred_kevent+0x0/0x388 [ 1550.279696][ T7677] Modules linked in: [ 1550.286105][ T7677] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1550.286766][ T7677] CPU: 0 UID: 0 PID: 7677 Comm: kworker/0:6 Not tainted 6.11.0-rc5-syzkaller #0 [ 1550.287153][ T7677] Hardware name: ARM-Versatile Express [ 1550.287592][ T7677] Workqueue: usb_hub_wq hub_event [ 1550.287912][ T7677] Call trace: [ 1550.288140][ T7677] [<8195cf00>] (dump_backtrace) from [<8195cffc>] (show_stack+0x18/0x1c) [ 1550.288502][ T7677] r7:00000000 r6:826228c4 r5:00000000 r4:8200ca48 [ 1550.288698][ T7677] [<8195cfe4>] (show_stack) from [<8197ad20>] (dump_stack_lvl+0x54/0x7c) [ 1550.289068][ T7677] [<8197accc>] (dump_stack_lvl) from [<8197ad60>] (dump_stack+0x18/0x1c) [ 1550.289350][ T7677] r5:00000000 r4:8286dd18 [ 1550.289501][ T7677] [<8197ad48>] (dump_stack) from [<8195daa4>] (panic+0x120/0x368) [ 1550.289759][ T7677] [<8195d984>] (panic) from [<802421e4>] (get_taint+0x0/0x1c) [ 1550.290020][ T7677] r3:8260c5c4 r2:00000001 r1:81ff526c r0:81ffd044 [ 1550.290215][ T7677] r7:8082dc3c [ 1550.290344][ T7677] [<80242170>] (check_panic_on_warn) from [<80242338>] (__warn+0x7c/0x180) [ 1550.290613][ T7677] [<802422bc>] (__warn) from [<80242624>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 1550.290922][ T7677] r8:00000009 r7:8205bd0c r6:dfcfda8c r5:8372a400 r4:00000000 [ 1550.291144][ T7677] [<80242440>] (warn_slowpath_fmt) from [<8082dc3c>] (debug_print_object+0xc4/0xd8) [ 1550.291467][ T7677] r10:00000005 r9:852ed000 r8:81a01c24 r7:820862b4 r6:828d171c r5:dfcfdb34 [ 1550.291736][ T7677] r4:8260cda4 [ 1550.291880][ T7677] [<8082db78>] (debug_print_object) from [<8082f4dc>] (debug_check_no_obj_freed+0x254/0x2a0) [ 1550.292189][ T7677] r8:852ed800 r7:852ed7cc r6:00000100 r5:00000003 r4:00000000 [ 1550.292445][ T7677] [<8082f288>] (debug_check_no_obj_freed) from [<804bc95c>] (kfree+0x198/0x338) [ 1550.292816][ T7677] r10:82779f24 r9:85e5f880 r8:852ed000 r7:804617e0 r6:82c023c0 r5:ddeb38a0 [ 1550.293158][ T7677] r4:852ed000 [ 1550.293339][ T7677] [<804bc7c4>] (kfree) from [<804617e0>] (kvfree+0x2c/0x30) [ 1550.293772][ T7677] r10:82779f24 r9:85e5f880 r8:852ed000 r7:00000000 r6:84ac4d00 r5:85253300 [ 1550.294100][ T7677] r4:852ed000 [ 1550.294255][ T7677] [<804617b4>] (kvfree) from [<814c5a7c>] (netdev_release+0x2c/0x34) [ 1550.294600][ T7677] r5:85253300 r4:852ed000 [ 1550.294835][ T7677] [<814c5a50>] (netdev_release) from [<80a74990>] (device_release+0x38/0xa8) [ 1550.295453][ T7677] r5:85253300 r4:852ed3c0 [ 1550.295665][ T7677] [<80a74958>] (device_release) from [<81936d48>] (kobject_put+0xa0/0x1f4) [ 1550.296037][ T7677] r5:81b4b7cc r4:852ed3c0 [ 1550.296238][ T7677] [<81936ca8>] (kobject_put) from [<80a74bbc>] (put_device+0x18/0x1c) [ 1550.296673][ T7677] r7:85e5d800 r6:852ed10c r5:852ed000 r4:00000000 [ 1550.296925][ T7677] [<80a74ba4>] (put_device) from [<8147a9b4>] (free_netdev+0x114/0x18c) [ 1550.297313][ T7677] [<8147a8a0>] (free_netdev) from [<80d568e8>] (usbnet_disconnect+0xac/0xf0) [ 1550.297688][ T7677] r6:852ed794 r5:852ed680 r4:00000000 [ 1550.297888][ T7677] [<80d5683c>] (usbnet_disconnect) from [<80dbe548>] (usb_unbind_interface+0x84/0x2c4) [ 1550.298235][ T7677] r8:00000044 r7:85e5d830 r6:82779f24 r5:00000000 r4:85e5d800 [ 1550.298538][ T7677] [<80dbe4c4>] (usb_unbind_interface) from [<80a7ca94>] (device_remove+0x64/0x6c) [ 1550.298964][ T7677] r10:00000000 r9:85e5f880 r8:00000044 r7:85e5d874 r6:82779f24 r5:00000000 [ 1550.299431][ T7677] r4:85e5d830 [ 1550.299581][ T7677] [<80a7ca30>] (device_remove) from [<80a7dfac>] (device_release_driver_internal+0x18c/0x200) [ 1550.299985][ T7677] r5:00000000 r4:85e5d830 [ 1550.300161][ T7677] [<80a7de20>] (device_release_driver_internal) from [<80a7e038>] (device_release_driver+0x18/0x1c) [ 1550.300532][ T7677] r9:85e5f880 r8:82f5ad40 r7:82f5ad38 r6:82f5ad0c r5:85e5d830 r4:82f5ad30 [ 1550.300820][ T7677] [<80a7e020>] (device_release_driver) from [<80a7c118>] (bus_remove_device+0xcc/0x120) [ 1550.301206][ T7677] [<80a7c04c>] (bus_remove_device) from [<80a76228>] (device_del+0x148/0x38c) [ 1550.301581][ T7677] r9:85e5f880 r8:8372a400 r7:04208060 r6:00000000 r5:85e5d830 r4:85e5d874 [ 1550.301882][ T7677] [<80a760e0>] (device_del) from [<80dbbf64>] (usb_disable_device+0xdc/0x1f0) [ 1550.302236][ T7677] r10:00000000 r9:00000000 r8:85e5d800 r7:85e5f800 r6:845add08 r5:00000001 [ 1550.302524][ T7677] r4:00000038 [ 1550.302679][ T7677] [<80dbbe88>] (usb_disable_device) from [<80db0dc8>] (usb_disconnect+0xec/0x29c) [ 1550.303017][ T7677] r10:00000001 r9:83443000 r8:85e5f8c4 r7:83e46000 r6:85e5f880 r5:85e5f800 [ 1550.303295][ T7677] r4:60000013 [ 1550.303442][ T7677] [<80db0cdc>] (usb_disconnect) from [<80db3a78>] (hub_event+0xe78/0x194c) [ 1550.303770][ T7677] r10:00000001 r9:00000100 r8:837dd900 r7:85e5f800 r6:83e45800 r5:83e46210 [ 1550.304044][ T7677] r4:00000001 [ 1550.304190][ T7677] [<80db2c00>] (hub_event) from [<80265f08>] (process_one_work+0x1b4/0x4f4) [ 1550.304518][ T7677] r10:82e6e805 r9:8372a400 r8:00800000 r7:dddd0000 r6:82e6e800 r5:837dd900 [ 1550.304964][ T7677] r4:84456000 [ 1550.305394][ T7677] [<80265d54>] (process_one_work) from [<80266aec>] (worker_thread+0x1ec/0x3b4) [ 1550.306371][ T7677] r10:8372a400 r9:8445602c r8:61c88647 r7:dddd0020 r6:82604d40 r5:dddd0000 [ 1550.306655][ T7677] r4:84456000 [ 1550.306815][ T7677] [<80266900>] (worker_thread) from [<8026fb04>] (kthread+0x104/0x134) [ 1550.307130][ T7677] r10:00000000 r9:dfc71e78 r8:851c7200 r7:84456000 r6:80266900 r5:8372a400 [ 1550.307406][ T7677] r4:851c7c40 [ 1550.307584][ T7677] [<8026fa00>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1550.308065][ T7677] Exception stack(0xdfcfdfb0 to 0xdfcfdff8) [ 1550.308532][ T7677] dfa0: 00000000 00000000 00000000 00000000 [ 1550.308878][ T7677] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1550.309230][ T7677] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1550.309496][ T7677] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa00 r4:851c7c40 [ 1550.311256][ T7677] Rebooting in 86400 seconds.. VM DIAGNOSIS: 21:07:14 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=60000113 R02=00000103 R03=00000005 R04=828c940c R05=00000000 R06=0000004a R07=0000024b R08=828c9410 R09=806f3428 R10=828c9414 R11=df801694 R12=df801640 R13=df801640 R14=81987ea0 R15=81987e70 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005727e9 s17=00000000 d08=00000000005727e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=086be029 s33=19038bca d16=19038bca086be029 s34=aa2639af s35=1496f2fa d17=1496f2faaa2639af s36=862d1c1b s37=f24f6536 d18=f24f6536862d1c1b s38=b25f6deb s39=821e90c5 d19=821e90c5b25f6deb s40=e9e24eb4 s41=12a69088 d20=12a69088e9e24eb4 s42=663d59f8 s43=c2a75c70 d21=c2a75c70663d59f8 s44=f6e02d57 s45=869ce3fd d22=869ce3fdf6e02d57 s46=56349ca2 s47=b900c77b d23=b900c77b56349ca2 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=003c0000 s53=00280000 d26=00280000003c0000 s54=00140000 s55=00080000 d27=0008000000140000 s56=00000008 s57=00080004 d28=0008000400000008 s58=03e60000 s59=ffae0000 d29=ffae000003e60000 s60=0008ffff s61=00000000 d30=000000000008ffff s62=00000300 s63=ffbe0000 d31=ffbe000000000300 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=0004b9e6 R02=7effb000 R03=00000000 R04=00000007 R05=7efb30f8 R06=005b2b58 R07=018391d8 R08=00000000 R09=01834548 R10=7efb327c R11=7efb30dc R12=7efb30e0 R13=7efb3098 R14=7effc4d8 R15=7effc518 PSR=20000010 --C- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005727e9 s17=00000000 d08=00000000005727e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=900303ff s33=ffff0206 d16=ffff0206900303ff s34=0303ffff s35=ff020698 d17=ff0206980303ffff s36=03ffffff s37=0206a003 d18=0206a00303ffffff s38=ffffffff s39=06a80303 d19=06a80303ffffffff s40=ffffff02 s41=b00303ff d20=b00303ffffffff02 s42=ffff0206 s43=0303ffff d21=0303ffffffff0206 s44=ff0206b8 s45=03ffffff d22=03ffffffff0206b8 s46=0206c003 s47=ffffffff d23=ffffffff0206c003 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=061ec560 s53=7e1e515a d26=7e1e515a061ec560 s54=da62789d s55=497f33d4 d27=497f33d4da62789d s56=0798124d s57=472eecb0 d28=472eecb00798124d s58=8b825fd7 s59=94cc883c d29=94cc883c8b825fd7 s60=267326ad s61=9aa2fa2a d30=9aa2fa2a267326ad s62=c8fb732e s63=030acdfa d31=030acdfac8fb732e FPSCR: 00000000