last executing test programs: 9m11.805767498s ago: executing program 1 (id=2119): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000003580)=""/4092, 0xffc}, {&(0x7f0000000040)=""/189, 0xbd}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000600)=""/101, 0x65}, {&(0x7f0000002580)=""/4074, 0xfea}], 0x5}, 0x8}], 0x1, 0x40012002, 0x0) 9m11.560415458s ago: executing program 1 (id=2120): r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000500)="1c0000001a009b8a14e500"/28, 0x1c) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) 9m11.385528875s ago: executing program 1 (id=2121): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)=0x0) timer_settime(r2, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000e80)="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", 0x266}, {&(0x7f0000000580)="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", 0x175}, {&(0x7f0000000740)="266a546475688763b44d30a862bc689d0b1d020dbb8656767fbd1d91637fccf4e308ae461b2548ba45299eb42928ff4ee493318ef9f71739a3f86f5193e556e085fc8c4793ffc8395e70ba93fd9e9d5f5413437784f92bb0128a9756b1c9b87c36cfe56c02568995726f7538f9ed3095531590839a2be05cf75ab02f51372bbc48c81b0283ffac37f28926e0a20a01d3ae06d03acc7095428e97af0141e80215b0823f76efad", 0xa6}], 0x3, 0x0, 0x0, 0x4090}, 0x0) sendmsg$alg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 9m8.729194473s ago: executing program 1 (id=2127): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280), 0x810000, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x205) 9m8.508804062s ago: executing program 1 (id=2128): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x1c1842, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000b, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x7, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) syz_io_uring_setup(0x766f, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r4, 0x0, 0x4000000) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="1e0308004d6b71ef"], 0xffdd) write$cgroup_devices(r0, 0x0, 0xffdd) 9m8.243285063s ago: executing program 1 (id=2129): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000090024206d041cc340000000000109022400010000a00009040000010301010009210008000122010009058103"], 0x0) syz_usb_control_io(r0, &(0x7f0000000740)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x20, 0x29, 0xf, {0xf, 0x29, 0xa, 0x0, 0xed, 0xa, "0249c7b0", "47cb7b66"}}, 0x0}, 0x0) syz_usb_control_io(r0, &(0x7f0000000440)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x20, 0x29, 0xf, {0xf, 0x29, 0x8, 0x18, 0x7, 0x81, "3acd0596", "523d1044"}}, 0x0}, &(0x7f00000009c0)={0x84, 0x0, &(0x7f0000000600)={0x0, 0xa, 0x1, 0xa}, &(0x7f0000000640)={0x0, 0x8, 0x1, 0x81}, 0x0, &(0x7f00000006c0)={0x20, 0x0, 0x4, {0x1c00, 0x2}}, &(0x7f0000000700)={0x40, 0x7, 0x2, 0x3}, &(0x7f0000000740)={0x40, 0x9, 0x1, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) 9m8.218005374s ago: executing program 32 (id=2129): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000090024206d041cc340000000000109022400010000a00009040000010301010009210008000122010009058103"], 0x0) syz_usb_control_io(r0, &(0x7f0000000740)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x20, 0x29, 0xf, {0xf, 0x29, 0xa, 0x0, 0xed, 0xa, "0249c7b0", "47cb7b66"}}, 0x0}, 0x0) syz_usb_control_io(r0, &(0x7f0000000440)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x20, 0x29, 0xf, {0xf, 0x29, 0x8, 0x18, 0x7, 0x81, "3acd0596", "523d1044"}}, 0x0}, &(0x7f00000009c0)={0x84, 0x0, &(0x7f0000000600)={0x0, 0xa, 0x1, 0xa}, &(0x7f0000000640)={0x0, 0x8, 0x1, 0x81}, 0x0, &(0x7f00000006c0)={0x20, 0x0, 0x4, {0x1c00, 0x2}}, &(0x7f0000000700)={0x40, 0x7, 0x2, 0x3}, &(0x7f0000000740)={0x40, 0x9, 0x1, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) 16.372529752s ago: executing program 0 (id=2600): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a010200000000000000000100fffe0900010073797a30000000000900030073797a3213000000dc000000060a010400000000000000000100000508000b4000000000b4000480200001800d00010073796e70726f7879000000000c000280060001400000000034000180080001006c6f670028000280080006400000000d110002402b24292d2d2a5d24402c2d400000000006000440000700003c0001800900010068617368000000002c000280080007400000000008000340000000160800014000ff00120800024000000000080004400000000020000180080001006e61740014000280080003400000000008000540000000000900010073797a30"], 0x150}}, 0x0) 15.706109218s ago: executing program 0 (id=2601): r0 = syz_open_dev$evdev(&(0x7f0000001900), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x3000c81c) r5 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r5, 0x6, 0x0, 0x0, 0x0) fsmount(r5, 0x0, 0xc) read$hidraw(r0, &(0x7f0000000180)=""/215, 0xd7) 8.435776431s ago: executing program 2 (id=2606): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r1, 0x0, 0x178}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x6a855000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) 5.997760659s ago: executing program 0 (id=2607): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)=0x0) timer_settime(r3, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000e80)="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", 0x25d}, {&(0x7f0000000580)="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", 0x174}, {&(0x7f0000000740)="266a546475688763b44d30a862bc689d0b1d020dbb8656767fbd1d91637fccf4e308ae461b2548ba45299eb42928ff4ee493318ef9f71739a3f86f5193e556e085fc8c4793ffc8395e70ba93fd9e9d5f5413437784f92bb0128a9756b1c9b87c36cfe56c02568995726f7538f9ed3095531590839a2be05cf75ab02f51372bbc48c81b0283ffac", 0x87}], 0x3, 0x0, 0x0, 0x4090}, 0x0) sendmsg$alg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 5.573788276s ago: executing program 0 (id=2608): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000180)='io_uring_create\x00', r0, 0x0, 0x5}, 0x18) io_uring_setup(0x2ad4, &(0x7f00000000c0)={0x0, 0x4aab, 0x10000}) 4.97247802s ago: executing program 0 (id=2609): r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100), 0x1f, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100), 0x1f, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x1ff, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000400)={r4, 0x0, 0x0, 0x0, 0x0, [0x0], [], [0x1000], [0x0, 0x0, 0x0, 0xffffffffffffffff]}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={r5}) 4.209660771s ago: executing program 0 (id=2610): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x200000000000002f, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x989}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) sigaltstack(&(0x7f0000000480)={&(0x7f0000004000)=""/4126, 0x80000001, 0x101e}, 0x0) 2.828154046s ago: executing program 2 (id=2612): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)=0x0) timer_settime(r3, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000e80)="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", 0x25d}, {&(0x7f0000000580)="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", 0x174}, {&(0x7f0000000740)="266a546475688763b44d30a862bc689d0b1d020dbb8656767fbd1d91637fccf4e308ae461b2548ba45299eb42928ff4ee493318ef9f71739a3f86f5193e556e085fc8c4793ffc8395e70ba93fd9e9d5f5413437784f92bb0128a9756b1c9b87c36cfe56c02568995726f7538f9ed3095531590839a2be05cf75ab02f51372bbc48c81b0283ffac", 0x87}], 0x3, 0x0, 0x0, 0x4090}, 0x0) sendmsg$alg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 2.308284737s ago: executing program 2 (id=2613): r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) write$selinux_context(r0, &(0x7f0000000400)='system_u:object_r:etc_aliases_t:s0\x00', 0x23) 1.436038252s ago: executing program 2 (id=2614): epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000200)=0xc) r0 = syz_open_dev$loop(&(0x7f0000000700), 0x47d, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000005c0)={r1, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1e, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x5, 0x88000) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000001280)={r0, 0x0, {0x2a12, 0x80010000, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x3, 0x10, "fe78fc179fd1e1dab6a7bd64c6a4b4e00d9683dda3af9ea80000000000000000000000deff0000000000000000080000000000000800", "2809e8dbe108038948224ad54afac11d875397bdb22d0000b420a1a93c7540f4767f9e01177d3dd40600000061ac00", "90be8b1c55f96400", [0x800, 0x3]}}) 728.678931ms ago: executing program 2 (id=2615): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x1c, 0x20000000000000bb, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000180)={0x5c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2=0xe0000001}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x5c}}, 0x0) 0s ago: executing program 2 (id=2616): socket$inet6_udplite(0xa, 0x2, 0x88) r0 = gettid() write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0xffffff6a) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x200000000000000) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) kernel console output (not intermixed with test programs): daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2610.141733][ T31] audit: type=1400 audit(2610.070:21957): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2610.153081][ T31] audit: type=1400 audit(2610.080:21958): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2610.184583][ T31] audit: type=1400 audit(2610.110:21959): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2610.197329][ T31] audit: type=1400 audit(2610.120:21960): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2610.229908][ T31] audit: type=1400 audit(2610.150:21961): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2610.230236][ T31] audit: type=1400 audit(2610.160:21962): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2610.276614][ T31] audit: type=1400 audit(2610.200:21963): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2610.276930][ T31] audit: type=1400 audit(2610.200:21964): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2610.356726][ T31] audit: type=1400 audit(2610.280:21965): avc: denied { prog_load } for pid=12585 comm="syz.0.2315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2615.758232][ T31] kauditd_printk_skb: 81 callbacks suppressed [ 2615.758487][ T31] audit: type=1400 audit(2615.690:22047): avc: denied { mounton } for pid=12592 comm="syz.0.2318" path="/439/file0" dev="tmpfs" ino=2249 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2615.983783][ T31] audit: type=1400 audit(2615.900:22048): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2615.984167][ T31] audit: type=1400 audit(2615.900:22049): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2615.984497][ T31] audit: type=1400 audit(2615.910:22050): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2615.984707][ T31] audit: type=1400 audit(2615.910:22051): avc: denied { recv } for pid=12588 comm="syz.2.2316" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2616.037100][ T31] audit: type=1400 audit(2615.950:22052): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2616.053769][ T31] audit: type=1400 audit(2615.980:22053): avc: denied { recv } for pid=12563 comm="syz.0.2309" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2616.057006][ T31] audit: type=1400 audit(2615.980:22054): avc: denied { recv } for pid=12563 comm="syz.0.2309" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2616.106752][ T31] audit: type=1400 audit(2616.000:22055): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2616.107340][ T31] audit: type=1400 audit(2616.000:22056): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2634.846093][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 2634.846539][ T31] audit: type=1400 audit(2634.770:22125): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2634.846758][ T31] audit: type=1400 audit(2634.770:22126): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2634.870251][ T31] audit: type=1400 audit(2634.800:22127): avc: denied { unmount } for pid=11517 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2634.885715][ T31] audit: type=1400 audit(2634.810:22128): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2634.898567][ T31] audit: type=1400 audit(2634.830:22129): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2634.921489][ T31] audit: type=1400 audit(2634.850:22130): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2634.945276][ T31] audit: type=1400 audit(2634.870:22131): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2634.945646][ T31] audit: type=1400 audit(2634.870:22132): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2634.991673][ T31] audit: type=1400 audit(2634.920:22133): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2634.992036][ T31] audit: type=1400 audit(2634.920:22134): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.851429][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 2639.851698][ T31] audit: type=1400 audit(2639.780:22196): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.857046][ T31] audit: type=1400 audit(2639.780:22197): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.877071][ T31] audit: type=1400 audit(2639.790:22198): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.888635][ T31] audit: type=1400 audit(2639.820:22199): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.890972][ T31] audit: type=1400 audit(2639.820:22200): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.908866][ T31] audit: type=1400 audit(2639.830:22201): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2639.910599][ T31] audit: type=1400 audit(2639.830:22202): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2640.049008][ T31] audit: type=1400 audit(2639.980:22203): avc: denied { create } for pid=12621 comm="syz.0.2326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2640.058668][ T31] audit: type=1400 audit(2639.990:22204): avc: denied { ioctl } for pid=12621 comm="syz.0.2326" path="socket:[26025]" dev="sockfs" ino=26025 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2640.066222][ T31] audit: type=1400 audit(2639.990:22205): avc: denied { module_request } for pid=12621 comm="syz.0.2326" kmod="netdev-vcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2647.188355][ T31] kauditd_printk_skb: 91 callbacks suppressed [ 2647.188983][ T31] audit: type=1400 audit(2647.110:22297): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2647.189117][ T31] audit: type=1400 audit(2647.120:22298): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2647.207499][ T31] audit: type=1400 audit(2647.130:22299): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2647.234023][ T31] audit: type=1400 audit(2647.160:22300): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2647.262560][ T31] audit: type=1400 audit(2647.190:22301): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2647.280656][ T31] audit: type=1400 audit(2647.200:22302): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2647.280873][ T31] audit: type=1400 audit(2647.210:22303): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2647.321273][ T31] audit: type=1400 audit(2647.250:22304): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2647.321520][ T31] audit: type=1400 audit(2647.250:22305): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2647.411820][ T31] audit: type=1400 audit(2647.340:22306): avc: denied { execmem } for pid=12651 comm="syz.0.2335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2648.910747][T12657] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2337'. [ 2652.209695][ T31] kauditd_printk_skb: 45 callbacks suppressed [ 2652.210088][ T31] audit: type=1400 audit(2652.130:22352): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.210210][ T31] audit: type=1400 audit(2652.130:22353): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.210260][ T31] audit: type=1400 audit(2652.140:22354): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.252785][ T31] audit: type=1400 audit(2652.180:22355): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.265042][ T31] audit: type=1400 audit(2652.190:22356): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.265235][ T31] audit: type=1400 audit(2652.190:22357): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.298899][ T31] audit: type=1400 audit(2652.220:22358): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.299144][ T31] audit: type=1400 audit(2652.230:22359): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2652.693364][ T31] audit: type=1400 audit(2652.620:22360): avc: denied { read write } for pid=12663 comm="syz.2.2339" name="mouse0" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2652.716052][ T31] audit: type=1400 audit(2652.640:22361): avc: denied { read write open } for pid=12663 comm="syz.2.2339" path="/dev/input/mouse0" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2654.965656][T12675] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2342'. [ 2655.445611][T12679] fuse: Bad value for 'fd' [ 2658.456839][ T31] kauditd_printk_skb: 123 callbacks suppressed [ 2658.457198][ T31] audit: type=1400 audit(2658.360:22485): avc: denied { create } for pid=12682 comm="syz.2.2346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2658.457338][ T31] audit: type=1400 audit(2658.380:22486): avc: denied { bind } for pid=12682 comm="syz.2.2346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2658.458317][ T31] audit: type=1400 audit(2658.380:22487): avc: denied { module_request } for pid=12682 comm="syz.2.2346" kmod="crypto-ecb-camellia-aesni-avx2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2659.155889][ T31] audit: type=1400 audit(2658.890:22488): avc: denied { setopt } for pid=12682 comm="syz.2.2346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2659.157242][ T31] audit: type=1400 audit(2658.900:22489): avc: denied { accept } for pid=12682 comm="syz.2.2346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2659.157491][ T31] audit: type=1400 audit(2658.920:22490): avc: denied { write } for pid=12682 comm="syz.2.2346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2659.157715][ T31] audit: type=1400 audit(2658.930:22491): avc: denied { read } for pid=12682 comm="syz.2.2346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2659.158107][ T31] audit: type=1400 audit(2658.940:22492): avc: denied { read } for pid=12682 comm="syz.2.2346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2659.158626][ T31] audit: type=1400 audit(2658.950:22493): avc: denied { write } for pid=12682 comm="syz.2.2346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2659.170375][ T31] audit: type=1400 audit(2658.970:22494): avc: denied { read append } for pid=12682 comm="syz.2.2346" name="comedi4" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2664.037422][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 2664.037797][ T31] audit: type=1400 audit(2663.950:22500): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2664.038081][ T31] audit: type=1400 audit(2663.960:22501): avc: denied { recv } for pid=12651 comm="syz.0.2335" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2664.087728][ T31] audit: type=1400 audit(2664.000:22502): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2664.088185][ T31] audit: type=1400 audit(2664.000:22503): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2664.088432][ T31] audit: type=1400 audit(2664.010:22504): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2664.102592][ T31] audit: type=1400 audit(2664.030:22505): avc: denied { recv } for pid=11517 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2664.105118][ T31] audit: type=1400 audit(2664.030:22506): avc: denied { recv } for pid=11517 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2664.133750][ T31] audit: type=1400 audit(2664.060:22507): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2664.134132][ T31] audit: type=1400 audit(2664.060:22508): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2664.293074][ T31] audit: type=1400 audit(2664.220:22509): avc: denied { create } for pid=12693 comm="syz.2.2347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2664.838470][T12697] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2347'. [ 2665.104792][T12699] fuse: Bad value for 'fd' [ 2665.339998][T12701] fuse: Bad value for 'fd' [ 2669.614767][ T31] kauditd_printk_skb: 74 callbacks suppressed [ 2669.615081][ T31] audit: type=1400 audit(2669.540:22584): avc: denied { recv } for pid=12706 comm="syz.2.2352" saddr=127.0.0.1 src=20002 daddr=127.0.0.1 dest=55304 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2669.619369][ T31] audit: type=1400 audit(2669.550:22585): avc: denied { recv } for pid=1809 comm="kworker/1:3" saddr=127.0.0.1 src=55304 daddr=127.0.0.1 dest=20002 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2669.633839][ T31] audit: type=1400 audit(2669.560:22586): avc: denied { recv } for pid=12706 comm="syz.2.2352" saddr=127.0.0.1 src=55304 daddr=127.0.0.1 dest=20002 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2669.638361][ T31] audit: type=1400 audit(2669.570:22587): avc: denied { recv } for pid=1809 comm="kworker/1:3" saddr=127.0.0.1 src=20002 daddr=127.0.0.1 dest=55304 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2669.645971][ T31] audit: type=1400 audit(2669.570:22588): avc: denied { recv } for pid=1809 comm="kworker/1:3" saddr=127.0.0.1 src=20002 daddr=127.0.0.1 dest=55304 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2669.670340][ T31] audit: type=1400 audit(2669.590:22589): avc: denied { recv } for pid=10236 comm="kworker/0:4" saddr=127.0.0.1 src=55304 daddr=127.0.0.1 dest=20002 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2669.670618][ T31] audit: type=1400 audit(2669.600:22590): avc: denied { recv } for pid=10236 comm="kworker/0:4" saddr=127.0.0.1 src=20002 daddr=127.0.0.1 dest=55304 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2669.977289][ T31] audit: type=1400 audit(2669.890:22591): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2669.977584][ T31] audit: type=1400 audit(2669.890:22592): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2670.000264][ T31] audit: type=1400 audit(2669.930:22593): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2670.230718][T12711] fuse: Bad value for 'fd' [ 2670.539147][T12713] fuse: Bad value for 'fd' [ 2671.555493][T12721] fuse: Bad value for 'fd' [ 2675.434604][ T31] kauditd_printk_skb: 98 callbacks suppressed [ 2675.434855][ T31] audit: type=1400 audit(2675.360:22692): avc: denied { create } for pid=12728 comm="syz.0.2362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2675.973106][ T31] audit: type=1400 audit(2675.900:22693): avc: denied { prog_load } for pid=12728 comm="syz.0.2362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2676.008692][ T31] audit: type=1400 audit(2675.940:22694): avc: denied { bpf } for pid=12728 comm="syz.0.2362" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2676.012739][ T31] audit: type=1400 audit(2675.940:22695): avc: denied { perfmon } for pid=12728 comm="syz.0.2362" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2676.040389][ T31] audit: type=1400 audit(2675.970:22696): avc: denied { perfmon } for pid=12728 comm="syz.0.2362" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2676.070533][ T31] audit: type=1400 audit(2676.000:22697): avc: denied { perfmon } for pid=12728 comm="syz.0.2362" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2676.074928][ T31] audit: type=1400 audit(2676.000:22698): avc: denied { perfmon } for pid=12728 comm="syz.0.2362" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2676.105700][ T31] audit: type=1400 audit(2676.030:22699): avc: denied { perfmon } for pid=12728 comm="syz.0.2362" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2676.120391][ T31] audit: type=1400 audit(2676.050:22700): avc: denied { bpf } for pid=12728 comm="syz.0.2362" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2676.151135][ T31] audit: type=1400 audit(2676.080:22701): avc: denied { bpf } for pid=12728 comm="syz.0.2362" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2682.103762][ T31] kauditd_printk_skb: 66 callbacks suppressed [ 2682.104071][ T31] audit: type=1400 audit(2682.030:22768): avc: denied { unmount } for pid=11517 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2682.117432][ T31] audit: type=1400 audit(2682.040:22769): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2682.121062][ T31] audit: type=1400 audit(2682.050:22770): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2682.133453][ T31] audit: type=1400 audit(2682.060:22771): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2682.148287][ T31] audit: type=1400 audit(2682.080:22772): avc: denied { recv } for pid=11654 comm="kworker/u9:2" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2682.182056][ T31] audit: type=1400 audit(2682.110:22773): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2682.236155][ T31] audit: type=1400 audit(2682.160:22774): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2682.236984][ T31] audit: type=1400 audit(2682.160:22775): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2682.252665][ T31] audit: type=1400 audit(2682.180:22776): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2682.252985][ T31] audit: type=1400 audit(2682.180:22777): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2691.617306][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 2691.617638][ T31] audit: type=1400 audit(2691.530:22811): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2691.617900][ T31] audit: type=1400 audit(2691.530:22812): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2691.618093][ T31] audit: type=1400 audit(2691.540:22813): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2691.624278][ T31] audit: type=1400 audit(2691.550:22814): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2691.647459][ T31] audit: type=1400 audit(2691.560:22815): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2691.659377][ T31] audit: type=1400 audit(2691.590:22816): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2691.661914][ T31] audit: type=1400 audit(2691.590:22817): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2691.680746][ T31] audit: type=1400 audit(2691.600:22818): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2691.683246][ T31] audit: type=1400 audit(2691.610:22819): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2691.819204][ T31] audit: type=1400 audit(2691.750:22820): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2694.030001][T12782] netlink: 44 bytes leftover after parsing attributes in process `syz.0.2379'. [ 2696.710792][ T31] kauditd_printk_skb: 115 callbacks suppressed [ 2696.711184][ T31] audit: type=1400 audit(2696.640:22936): avc: denied { prog_load } for pid=12795 comm="syz.0.2382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2696.736133][ T31] audit: type=1400 audit(2696.660:22937): avc: denied { bpf } for pid=12795 comm="syz.0.2382" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2696.739611][ T31] audit: type=1400 audit(2696.670:22938): avc: denied { perfmon } for pid=12795 comm="syz.0.2382" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2696.770870][ T31] audit: type=1400 audit(2696.700:22939): avc: denied { perfmon } for pid=12795 comm="syz.0.2382" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2696.830583][ T31] audit: type=1400 audit(2696.760:22940): avc: denied { perfmon } for pid=12795 comm="syz.0.2382" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2696.929681][ T31] audit: type=1400 audit(2696.850:22941): avc: denied { perfmon } for pid=12795 comm="syz.0.2382" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2696.998503][ T31] audit: type=1400 audit(2696.930:22942): avc: denied { perfmon } for pid=12795 comm="syz.0.2382" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2697.001672][ T31] audit: type=1400 audit(2696.930:22943): avc: denied { bpf } for pid=12795 comm="syz.0.2382" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2697.006044][ T31] audit: type=1400 audit(2696.930:22944): avc: denied { bpf } for pid=12795 comm="syz.0.2382" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2697.161192][ T31] audit: type=1400 audit(2697.090:22945): avc: denied { perfmon } for pid=12795 comm="syz.0.2382" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2704.328846][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 2704.329155][ T31] audit: type=1400 audit(2704.230:22959): avc: denied { map_create } for pid=12795 comm="syz.0.2382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2704.329372][ T31] audit: type=1400 audit(2704.240:22960): avc: denied { map_read map_write } for pid=12795 comm="syz.0.2382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2704.352866][ T31] audit: type=1400 audit(2704.280:22961): avc: denied { map_create } for pid=12795 comm="syz.0.2382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2704.354408][ T31] audit: type=1400 audit(2704.280:22962): avc: denied { bpf } for pid=12795 comm="syz.0.2382" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2704.355868][ T31] audit: type=1400 audit(2704.280:22963): avc: denied { map_read map_write } for pid=12795 comm="syz.0.2382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2715.421123][ T31] audit: type=1400 audit(2715.340:22964): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.423208][ T31] audit: type=1400 audit(2715.350:22965): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.435621][ T31] audit: type=1400 audit(2715.360:22966): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.457916][ T31] audit: type=1400 audit(2715.390:22967): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.476924][ T31] audit: type=1400 audit(2715.400:22968): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.508086][ T31] audit: type=1400 audit(2715.440:22969): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.513767][ T31] audit: type=1400 audit(2715.440:22970): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.561403][ T31] audit: type=1400 audit(2715.490:22971): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.563265][ T31] audit: type=1400 audit(2715.490:22972): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2715.884104][ T31] audit: type=1400 audit(2715.810:22973): avc: denied { read write } for pid=12799 comm="syz.2.2383" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2718.872926][T12806] Device name cannot be null; rc = [-22] [ 2720.684239][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 2720.684682][ T31] audit: type=1400 audit(2720.610:23002): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2720.688859][ T31] audit: type=1400 audit(2720.620:23003): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2720.734691][ T31] audit: type=1400 audit(2720.660:23004): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2720.741235][ T31] audit: type=1400 audit(2720.670:23005): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2720.754388][ T31] audit: type=1400 audit(2720.680:23006): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2720.793955][ T31] audit: type=1400 audit(2720.720:23007): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2720.797035][ T31] audit: type=1400 audit(2720.720:23008): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2720.825497][ T31] audit: type=1400 audit(2720.750:23009): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2720.837028][ T31] audit: type=1400 audit(2720.760:23010): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2721.098459][ T31] audit: type=1400 audit(2721.030:23011): avc: denied { module_request } for pid=12807 comm="syz.0.2386" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2722.203723][T12815] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2389'. [ 2722.295897][T12815] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12815 comm=syz.0.2389 [ 2723.028599][T12833] tmpfs: Unsupported parameter 'mpol' [ 2723.338536][T12835] fuse: Bad value for 'fd' [ 2727.087503][ T31] kauditd_printk_skb: 115 callbacks suppressed [ 2727.092916][ T31] audit: type=1400 audit(2727.020:23127): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2727.121075][ T31] audit: type=1400 audit(2727.050:23128): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2727.141745][ T31] audit: type=1400 audit(2727.070:23129): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2727.145513][ T31] audit: type=1400 audit(2727.070:23130): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2727.177143][ T31] audit: type=1400 audit(2727.090:23131): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2727.203503][ T31] audit: type=1400 audit(2727.130:23132): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2727.205632][ T31] audit: type=1400 audit(2727.130:23133): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2727.227480][ T31] audit: type=1400 audit(2727.150:23134): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2727.230731][ T31] audit: type=1400 audit(2727.160:23135): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2727.318488][ T31] audit: type=1400 audit(2727.250:23136): avc: denied { create } for pid=12843 comm="syz.2.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2727.533610][T12846] fuse: Bad value for 'fd' [ 2740.894219][ T31] kauditd_printk_skb: 154 callbacks suppressed [ 2740.894526][ T31] audit: type=1400 audit(2740.820:23291): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2740.947299][ T31] audit: type=1400 audit(2740.860:23292): avc: denied { recv } for pid=11517 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2740.947618][ T31] audit: type=1400 audit(2740.870:23293): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2740.947950][ T31] audit: type=1400 audit(2740.870:23294): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2740.954013][ T31] audit: type=1400 audit(2740.880:23295): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2740.987578][ T31] audit: type=1400 audit(2740.910:23296): avc: denied { recv } for pid=12854 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2740.988427][ T31] audit: type=1400 audit(2740.920:23297): avc: denied { recv } for pid=12854 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2741.002427][ T31] audit: type=1400 audit(2740.930:23298): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2741.003212][ T31] audit: type=1400 audit(2740.930:23299): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2741.053713][ T31] audit: type=1400 audit(2740.980:23300): avc: denied { execmem } for pid=12854 comm="syz.2.2401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2743.968546][T12865] fuse: Bad value for 'fd' [ 2746.069554][ T31] kauditd_printk_skb: 73 callbacks suppressed [ 2746.069928][ T31] audit: type=1400 audit(2746.000:23374): avc: denied { sys_module } for pid=12870 comm="syz.0.2405" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2746.074688][ T31] audit: type=1400 audit(2746.000:23375): avc: denied { module_request } for pid=12870 comm="syz.0.2405" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2746.424157][ T31] audit: type=1400 audit(2746.350:23376): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.424497][ T31] audit: type=1400 audit(2746.350:23377): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.443121][ T31] audit: type=1400 audit(2746.370:23378): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.449538][ T31] audit: type=1400 audit(2746.380:23379): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.478253][ T31] audit: type=1400 audit(2746.410:23380): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.535894][ T31] audit: type=1400 audit(2746.460:23381): avc: denied { recv } for pid=12880 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.537976][ T31] audit: type=1400 audit(2746.460:23382): avc: denied { recv } for pid=12880 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2746.555061][ T31] audit: type=1400 audit(2746.480:23383): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2751.083662][ T31] kauditd_printk_skb: 291 callbacks suppressed [ 2751.084085][ T31] audit: type=1400 audit(2751.010:23675): avc: denied { recv } for pid=12854 comm="syz.2.2401" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2751.084304][ T31] audit: type=1400 audit(2751.010:23676): avc: denied { recv } for pid=12854 comm="syz.2.2401" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2751.111109][ T31] audit: type=1400 audit(2751.040:23677): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2751.113030][ T31] audit: type=1400 audit(2751.040:23678): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2751.447728][ T31] audit: type=1400 audit(2751.370:23679): avc: denied { create } for pid=12902 comm="syz.0.2415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2751.497167][ T31] audit: type=1400 audit(2751.410:23680): avc: denied { bind } for pid=12902 comm="syz.0.2415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2751.497518][ T31] audit: type=1400 audit(2751.420:23681): avc: denied { setopt } for pid=12902 comm="syz.0.2415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2751.518786][ T31] audit: type=1400 audit(2751.450:23682): avc: denied { accept } for pid=12902 comm="syz.0.2415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2751.532525][ T31] audit: type=1400 audit(2751.460:23683): avc: denied { accept } for pid=12902 comm="syz.0.2415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2751.579281][ T31] audit: type=1400 audit(2751.510:23684): avc: denied { write } for pid=12902 comm="syz.0.2415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2756.268770][ T31] kauditd_printk_skb: 93 callbacks suppressed [ 2756.269019][ T31] audit: type=1400 audit(2756.200:23778): avc: denied { allowed } for pid=12915 comm="syz.0.2421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2756.312713][ T31] audit: type=1400 audit(2756.240:23779): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2756.316991][ T31] audit: type=1400 audit(2756.240:23780): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2756.326251][ T31] audit: type=1400 audit(2756.250:23781): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2756.355623][ T31] audit: type=1400 audit(2756.280:23782): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2756.406303][ T31] audit: type=1400 audit(2756.330:23783): avc: denied { recv } for pid=12563 comm="syz.0.2309" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2756.419358][ T31] audit: type=1400 audit(2756.350:23784): avc: denied { recv } for pid=12563 comm="syz.0.2309" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2756.443617][ T31] audit: type=1400 audit(2756.370:23785): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2756.443992][ T31] audit: type=1400 audit(2756.370:23786): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2757.042995][ T31] audit: type=1400 audit(2756.970:23787): avc: denied { create } for pid=12917 comm="syz.0.2422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2761.910706][ T31] kauditd_printk_skb: 90 callbacks suppressed [ 2761.910980][ T31] audit: type=1400 audit(2761.840:23878): avc: denied { create } for pid=12929 comm="syz.0.2427" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2761.924797][ T31] audit: type=1400 audit(2761.850:23879): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2761.945034][ T31] audit: type=1400 audit(2761.870:23880): avc: denied { recv } for pid=12563 comm="syz.0.2309" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2761.972314][ T31] audit: type=1400 audit(2761.900:23881): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2761.983459][ T31] audit: type=1400 audit(2761.910:23882): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2762.012494][ T31] audit: type=1400 audit(2761.940:23883): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2762.044677][ T31] audit: type=1400 audit(2761.970:23884): avc: denied { ioctl } for pid=12929 comm="syz.0.2427" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=27163 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2762.068806][ T31] audit: type=1400 audit(2761.990:23885): avc: denied { recv } for pid=12931 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2762.078009][ T31] audit: type=1400 audit(2762.000:23886): avc: denied { recv } for pid=12931 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2762.095001][ T31] audit: type=1400 audit(2762.020:23887): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2762.230762][T12932] gre1: entered promiscuous mode [ 2762.910774][T12937] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2429'. [ 2762.964053][T12937] bond_slave_0: entered promiscuous mode [ 2762.964382][T12937] bond_slave_1: entered promiscuous mode [ 2762.967517][T12937] macvlan2: entered promiscuous mode [ 2762.968193][T12937] bond0: entered promiscuous mode [ 2762.970805][T12937] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 2763.211810][T12936] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2427'. [ 2767.359929][ T31] kauditd_printk_skb: 99 callbacks suppressed [ 2767.360518][ T31] audit: type=1400 audit(2767.270:23987): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.360757][ T31] audit: type=1400 audit(2767.290:23988): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.385242][ T31] audit: type=1400 audit(2767.310:23989): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.404059][ T31] audit: type=1400 audit(2767.330:23990): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.417393][ T31] audit: type=1400 audit(2767.340:23991): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.457907][ T31] audit: type=1400 audit(2767.380:23992): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.459956][ T31] audit: type=1400 audit(2767.390:23993): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.545157][ T31] audit: type=1400 audit(2767.470:23994): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.548947][ T31] audit: type=1400 audit(2767.470:23995): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2767.872756][ T31] audit: type=1400 audit(2767.800:23996): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2771.939609][T12973] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2439'. [ 2772.566963][ T31] kauditd_printk_skb: 73 callbacks suppressed [ 2772.567463][ T31] audit: type=1400 audit(2772.490:24070): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2772.567693][ T31] audit: type=1400 audit(2772.490:24071): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2772.574270][ T31] audit: type=1400 audit(2772.500:24072): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2772.604696][ T31] audit: type=1400 audit(2772.530:24073): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2772.632527][ T31] audit: type=1400 audit(2772.560:24074): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2772.702971][ T31] audit: type=1400 audit(2772.610:24075): avc: denied { recv } for pid=2933 comm="klogd" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2772.756992][ T31] audit: type=1400 audit(2772.660:24076): avc: denied { recv } for pid=31 comm="kauditd" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2772.757270][ T31] audit: type=1400 audit(2772.680:24077): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2772.762991][ T31] audit: type=1400 audit(2772.690:24078): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2773.229456][ T31] audit: type=1400 audit(2773.160:24079): avc: denied { create } for pid=12976 comm="syz.0.2441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2775.120822][T12988] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 2777.588301][ T31] kauditd_printk_skb: 133 callbacks suppressed [ 2777.588657][ T31] audit: type=1400 audit(2777.520:24213): avc: denied { perfmon } for pid=12995 comm="syz.2.2449" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2777.609000][ T31] audit: type=1400 audit(2777.540:24214): avc: denied { bpf } for pid=12995 comm="syz.2.2449" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2777.612893][ T31] audit: type=1400 audit(2777.540:24215): avc: denied { perfmon } for pid=12995 comm="syz.2.2449" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2777.644582][ T31] audit: type=1400 audit(2777.560:24216): avc: denied { bpf } for pid=12995 comm="syz.2.2449" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2777.657543][ T31] audit: type=1400 audit(2777.560:24217): avc: denied { perfmon } for pid=12995 comm="syz.2.2449" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2777.657872][ T31] audit: type=1400 audit(2777.560:24218): avc: denied { bpf } for pid=12995 comm="syz.2.2449" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2777.660372][ T31] audit: type=1400 audit(2777.590:24219): avc: denied { prog_run } for pid=12995 comm="syz.2.2449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2777.807132][ T31] audit: type=1400 audit(2777.720:24220): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2777.808973][ T31] audit: type=1400 audit(2777.740:24221): avc: denied { recv } for pid=12563 comm="syz.0.2309" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2777.845380][ T31] audit: type=1400 audit(2777.770:24222): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2784.066133][ T31] kauditd_printk_skb: 79 callbacks suppressed [ 2784.067157][ T31] audit: type=1400 audit(2783.990:24302): avc: denied { unmount } for pid=11517 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2784.087530][ T31] audit: type=1400 audit(2784.010:24303): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2784.136167][ T31] audit: type=1400 audit(2784.060:24304): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2784.141686][ T31] audit: type=1400 audit(2784.060:24305): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2784.183517][ T31] audit: type=1400 audit(2784.110:24306): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2784.236287][ T31] audit: type=1400 audit(2784.160:24307): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2784.282443][ T31] audit: type=1400 audit(2784.210:24308): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2784.288470][ T31] audit: type=1400 audit(2784.210:24309): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2784.377578][ T31] audit: type=1400 audit(2784.300:24310): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2784.394720][ T31] audit: type=1400 audit(2784.320:24311): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2787.640291][T13040] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2461'. [ 2789.135987][ T31] kauditd_printk_skb: 103 callbacks suppressed [ 2789.136788][ T31] audit: type=1400 audit(2789.060:24415): avc: denied { prog_load } for pid=13047 comm="syz.0.2464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2789.160855][ T31] audit: type=1400 audit(2789.090:24416): avc: denied { bpf } for pid=13047 comm="syz.0.2464" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2789.173223][ T31] audit: type=1400 audit(2789.100:24417): avc: denied { perfmon } for pid=13047 comm="syz.0.2464" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2789.208467][ T31] audit: type=1400 audit(2789.140:24418): avc: denied { perfmon } for pid=13047 comm="syz.0.2464" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2789.270317][ T31] audit: type=1400 audit(2789.200:24419): avc: denied { perfmon } for pid=13047 comm="syz.0.2464" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2789.318093][ T31] audit: type=1400 audit(2789.240:24420): avc: denied { perfmon } for pid=13047 comm="syz.0.2464" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2789.318522][ T31] audit: type=1400 audit(2789.240:24421): avc: denied { bpf } for pid=13047 comm="syz.0.2464" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2789.339908][ T31] audit: type=1400 audit(2789.270:24422): avc: denied { bpf } for pid=13047 comm="syz.0.2464" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2789.399832][ T31] audit: type=1400 audit(2789.330:24423): avc: denied { prog_run } for pid=13047 comm="syz.0.2464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2789.488244][ T31] audit: type=1400 audit(2789.410:24424): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.161648][ T31] kauditd_printk_skb: 109 callbacks suppressed [ 2794.162008][ T31] audit: type=1400 audit(2794.090:24534): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.222014][ T31] audit: type=1400 audit(2794.150:24535): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.222345][ T31] audit: type=1400 audit(2794.150:24536): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.227536][ T31] audit: type=1400 audit(2794.150:24537): avc: denied { name_bind } for pid=13066 comm="syz.0.2472" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2794.239649][ T31] audit: type=1400 audit(2794.170:24538): avc: denied { node_bind } for pid=13066 comm="syz.0.2472" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2794.344888][ T31] audit: type=1400 audit(2794.270:24539): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.345213][ T31] audit: type=1400 audit(2794.270:24540): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.635746][ T31] audit: type=1400 audit(2794.560:24541): avc: denied { prog_load } for pid=13069 comm="syz.2.2473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2794.703848][ T31] audit: type=1400 audit(2794.630:24542): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.717367][ T31] audit: type=1400 audit(2794.640:24543): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2794.983639][T13070] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2473'. [ 2794.988283][T13070] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2473'. [ 2799.188859][ T31] kauditd_printk_skb: 121 callbacks suppressed [ 2799.189261][ T31] audit: type=1400 audit(2799.120:24665): avc: denied { recv } for pid=13094 comm="modprobe" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2799.207154][ T31] audit: type=1400 audit(2799.130:24666): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2799.227243][ T31] audit: type=1400 audit(2799.150:24667): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2799.270831][ T31] audit: type=1400 audit(2799.200:24668): avc: denied { recv } for pid=12563 comm="syz.0.2309" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2799.277212][ T31] audit: type=1400 audit(2799.200:24669): avc: denied { recv } for pid=12563 comm="syz.0.2309" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2799.311963][ T31] audit: type=1400 audit(2799.230:24670): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2799.315281][ T31] audit: type=1400 audit(2799.230:24671): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2799.320478][ T31] audit: type=1400 audit(2799.250:24672): avc: denied { sys_module } for pid=13088 comm="syz.0.2481" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2799.324392][ T31] audit: type=1400 audit(2799.250:24673): avc: denied { module_request } for pid=13088 comm="syz.0.2481" kmod="vxcan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2799.627097][ T31] audit: type=1400 audit(2799.550:24674): avc: denied { read } for pid=13096 comm="syz.2.2482" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2800.358996][T13100] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2484'. [ 2800.421096][T13100] vlan2: entered promiscuous mode [ 2800.422446][T13100] gretap0: entered promiscuous mode [ 2804.209717][ T31] kauditd_printk_skb: 166 callbacks suppressed [ 2804.210054][ T31] audit: type=1400 audit(2804.140:24841): avc: denied { read write open } for pid=13133 comm="syz.2.2492" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2804.221290][ T31] audit: type=1400 audit(2804.150:24842): avc: denied { allowed } for pid=13134 comm="syz.0.2493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2804.233050][ T31] audit: type=1400 audit(2804.160:24843): avc: denied { create } for pid=13134 comm="syz.0.2493" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2804.242905][ T31] audit: type=1400 audit(2804.170:24844): avc: denied { module_request } for pid=13133 comm="syz.2.2492" kmod="fs-smb3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2804.268262][ T31] audit: type=1400 audit(2804.190:24845): avc: denied { name_bind } for pid=13134 comm="syz.0.2493" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2804.270241][ T31] audit: type=1400 audit(2804.200:24846): avc: denied { node_bind } for pid=13134 comm="syz.0.2493" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2804.743374][ T31] audit: type=1400 audit(2804.670:24847): avc: denied { read write } for pid=13133 comm="syz.2.2492" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2804.752757][ T31] audit: type=1400 audit(2804.680:24848): avc: denied { read write open } for pid=13133 comm="syz.2.2492" path="/dev/cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2804.771439][ T31] audit: type=1400 audit(2804.700:24849): avc: denied { read write } for pid=13133 comm="syz.2.2492" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2804.782918][ T31] audit: type=1400 audit(2804.710:24850): avc: denied { read write open } for pid=13133 comm="syz.2.2492" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2809.248045][ T31] kauditd_printk_skb: 90 callbacks suppressed [ 2809.248516][ T31] audit: type=1400 audit(2809.170:24941): avc: denied { recv } for pid=9060 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.248622][ T31] audit: type=1400 audit(2809.170:24942): avc: denied { recv } for pid=9060 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.280874][ T31] audit: type=1400 audit(2809.210:24943): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.284655][ T31] audit: type=1400 audit(2809.210:24944): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.652228][ T31] audit: type=1400 audit(2809.580:24945): avc: denied { mounton } for pid=13164 comm="syz.0.2502" path="/544/file0" dev="tmpfs" ino=2798 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2809.807399][ T31] audit: type=1400 audit(2809.730:24946): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.807799][ T31] audit: type=1400 audit(2809.740:24947): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.826088][ T31] audit: type=1400 audit(2809.750:24948): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.830345][ T31] audit: type=1400 audit(2809.760:24949): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2809.853943][ T31] audit: type=1400 audit(2809.780:24950): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2813.586550][ C0] hrtimer: interrupt took 7992480 ns [ 2814.256866][ T31] kauditd_printk_skb: 602 callbacks suppressed [ 2814.257172][ T31] audit: type=1400 audit(2814.170:25553): avc: denied { bpf } for pid=13183 comm="syz.2.2510" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2814.257409][ T31] audit: type=1400 audit(2814.170:25554): avc: denied { perfmon } for pid=13183 comm="syz.2.2510" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2814.257479][ T31] audit: type=1400 audit(2814.170:25555): avc: denied { bpf } for pid=13183 comm="syz.2.2510" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2814.266042][ T31] audit: type=1400 audit(2814.190:25556): avc: denied { prog_run } for pid=13183 comm="syz.2.2510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2814.293439][ T31] audit: type=1400 audit(2814.220:25557): avc: denied { create } for pid=13183 comm="syz.2.2510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2814.311639][ T31] audit: type=1400 audit(2814.240:25558): avc: denied { write } for pid=13183 comm="syz.2.2510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2814.316755][ T31] audit: type=1400 audit(2814.240:25559): avc: denied { module_request } for pid=13183 comm="syz.2.2510" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2814.532624][ T31] audit: type=1400 audit(2814.460:25560): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2814.550333][ T31] audit: type=1400 audit(2814.480:25561): avc: denied { recv } for pid=13186 comm="modprobe" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2814.591470][ T31] audit: type=1400 audit(2814.520:25562): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2816.935798][T13199] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2514'. [ 2818.828542][T13210] process 'syz.2.2518' launched './file0' with NULL argv: empty string added [ 2819.474145][ T31] kauditd_printk_skb: 158 callbacks suppressed [ 2819.474688][ T31] audit: type=1400 audit(2819.400:25721): avc: denied { map_create } for pid=13214 comm="syz.0.2520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2819.482565][ T31] audit: type=1400 audit(2819.410:25722): avc: denied { perfmon } for pid=13214 comm="syz.0.2520" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2819.514440][ T31] audit: type=1400 audit(2819.440:25723): avc: denied { map_read map_write } for pid=13214 comm="syz.0.2520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2819.708003][ T31] audit: type=1400 audit(2819.640:25724): avc: denied { prog_load } for pid=13214 comm="syz.0.2520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2819.720131][ T31] audit: type=1400 audit(2819.650:25725): avc: denied { bpf } for pid=13214 comm="syz.0.2520" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2819.747848][ T31] audit: type=1400 audit(2819.680:25726): avc: denied { perfmon } for pid=13214 comm="syz.0.2520" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2819.766859][ T31] audit: type=1400 audit(2819.690:25727): avc: denied { perfmon } for pid=13214 comm="syz.0.2520" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2819.780838][ T31] audit: type=1400 audit(2819.710:25728): avc: denied { perfmon } for pid=13214 comm="syz.0.2520" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2819.790115][ T31] audit: type=1400 audit(2819.720:25729): avc: denied { perfmon } for pid=13214 comm="syz.0.2520" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2819.806061][ T31] audit: type=1400 audit(2819.730:25730): avc: denied { perfmon } for pid=13214 comm="syz.0.2520" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2822.800213][T13231] ªªªªªª: renamed from vlan0 (while UP) [ 2825.396967][ T31] kauditd_printk_skb: 230 callbacks suppressed [ 2825.397933][ T31] audit: type=1400 audit(2825.320:25961): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.399578][ T31] audit: type=1400 audit(2825.320:25962): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.416815][ T31] audit: type=1400 audit(2825.330:25963): avc: denied { unmount } for pid=11517 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2825.417169][ T31] audit: type=1400 audit(2825.340:25964): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.417388][ T31] audit: type=1400 audit(2825.340:25965): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.431265][ T31] audit: type=1400 audit(2825.360:25966): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.445848][ T31] audit: type=1400 audit(2825.370:25967): avc: denied { recv } for pid=2929 comm="syslogd" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.457543][ T31] audit: type=1400 audit(2825.380:25968): avc: denied { recv } for pid=2929 comm="syslogd" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.479020][ T31] audit: type=1400 audit(2825.400:25969): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2825.517401][ T31] audit: type=1400 audit(2825.400:25970): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.716973][ T31] kauditd_printk_skb: 76 callbacks suppressed [ 2830.717347][ T31] audit: type=1400 audit(2830.620:26047): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.717613][ T31] audit: type=1400 audit(2830.630:26048): avc: denied { unmount } for pid=11517 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2830.717903][ T31] audit: type=1400 audit(2830.630:26049): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.748155][ T31] audit: type=1400 audit(2830.680:26050): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.762716][ T31] audit: type=1400 audit(2830.690:26051): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.802095][ T31] audit: type=1400 audit(2830.730:26052): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.832644][ T31] audit: type=1400 audit(2830.760:26053): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.833057][ T31] audit: type=1400 audit(2830.760:26054): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.887339][ T31] audit: type=1400 audit(2830.810:26055): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2830.887847][ T31] audit: type=1400 audit(2830.820:26056): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2836.747229][ T31] kauditd_printk_skb: 97 callbacks suppressed [ 2836.747541][ T31] audit: type=1400 audit(2836.670:26154): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2836.747759][ T31] audit: type=1400 audit(2836.680:26155): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2836.774182][ T31] audit: type=1400 audit(2836.700:26156): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2836.801429][ T31] audit: type=1400 audit(2836.730:26157): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2836.809334][ T31] audit: type=1400 audit(2836.740:26158): avc: denied { unmount } for pid=11517 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2836.821567][ T31] audit: type=1400 audit(2836.750:26159): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2836.853370][ T31] audit: type=1400 audit(2836.780:26160): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2836.853751][ T31] audit: type=1400 audit(2836.780:26161): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2836.990985][ T31] audit: type=1400 audit(2836.910:26162): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2836.991346][ T31] audit: type=1400 audit(2836.920:26163): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2842.706023][ T31] kauditd_printk_skb: 79 callbacks suppressed [ 2842.718094][ T31] audit: type=1400 audit(2842.630:26243): avc: denied { unmount } for pid=11517 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2842.741968][ T31] audit: type=1400 audit(2842.650:26244): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2842.742298][ T31] audit: type=1400 audit(2842.660:26245): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2842.742482][ T31] audit: type=1400 audit(2842.670:26246): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2842.767182][ T31] audit: type=1400 audit(2842.690:26247): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2842.785101][ T31] audit: type=1400 audit(2842.710:26248): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2842.842838][ T31] audit: type=1400 audit(2842.760:26249): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2842.843188][ T31] audit: type=1400 audit(2842.770:26250): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2842.885572][ T31] audit: type=1400 audit(2842.800:26251): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2842.977491][ T31] audit: type=1400 audit(2842.800:26252): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2847.707497][ T31] kauditd_printk_skb: 161 callbacks suppressed [ 2847.708324][ T31] audit: type=1400 audit(2847.630:26414): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2847.733609][ T31] audit: type=1400 audit(2847.660:26415): avc: denied { create } for pid=13320 comm="syz.2.2556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2847.812273][ T31] audit: type=1400 audit(2847.740:26416): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2847.814947][ T31] audit: type=1400 audit(2847.740:26417): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2847.842073][ T31] audit: type=1400 audit(2847.770:26418): avc: denied { bind } for pid=13320 comm="syz.2.2556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2847.851480][ T31] audit: type=1400 audit(2847.770:26419): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2847.853985][ T31] audit: type=1400 audit(2847.780:26420): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2847.864860][ T31] audit: type=1400 audit(2847.790:26421): avc: denied { listen } for pid=13320 comm="syz.2.2556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2847.887054][ T31] audit: type=1400 audit(2847.810:26422): avc: denied { create } for pid=13320 comm="syz.2.2556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2847.921640][ T31] audit: type=1400 audit(2847.850:26423): avc: denied { connect } for pid=13320 comm="syz.2.2556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2852.925402][ T31] kauditd_printk_skb: 128 callbacks suppressed [ 2852.929543][ T31] audit: type=1400 audit(2852.850:26552): avc: denied { read } for pid=13343 comm="syz.0.2562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2852.966833][ T31] audit: type=1400 audit(2852.890:26553): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2852.968868][ T31] audit: type=1400 audit(2852.890:26554): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2852.991759][ T31] audit: type=1400 audit(2852.920:26555): avc: denied { recv } for pid=12563 comm="syz.0.2309" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2852.993786][ T31] audit: type=1400 audit(2852.920:26556): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2853.008397][ T31] audit: type=1400 audit(2852.930:26557): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2853.130118][ T31] audit: type=1400 audit(2853.060:26558): avc: denied { prog_load } for pid=13349 comm="syz.0.2563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2853.138828][ T31] audit: type=1400 audit(2853.070:26559): avc: denied { bpf } for pid=13349 comm="syz.0.2563" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2853.152562][ T31] audit: type=1400 audit(2853.080:26560): avc: denied { perfmon } for pid=13349 comm="syz.0.2563" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2853.224619][ T31] audit: type=1400 audit(2853.150:26561): avc: denied { perfmon } for pid=13349 comm="syz.0.2563" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2857.938222][ T31] kauditd_printk_skb: 170 callbacks suppressed [ 2857.942707][ T31] audit: type=1326 audit(2857.860:26732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13369 comm="syz.0.2570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 2857.947735][ T31] audit: type=1326 audit(2857.880:26733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13369 comm="syz.0.2570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 2857.950904][ T31] audit: type=1326 audit(2857.880:26734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13369 comm="syz.0.2570" exe="/syz-executor" sig=0 arch=40000028 syscall=442 compat=0 ip=0x132280 code=0x7ffc0000 [ 2857.952252][ T31] audit: type=1326 audit(2857.880:26735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13369 comm="syz.0.2570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 2857.953007][ T31] audit: type=1326 audit(2857.880:26736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13369 comm="syz.0.2570" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132280 code=0x7ffc0000 [ 2858.008917][ T31] audit: type=1400 audit(2857.940:26737): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2858.011317][ T31] audit: type=1400 audit(2857.940:26738): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2858.017004][ T31] audit: type=1400 audit(2857.940:26739): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2858.029762][ T31] audit: type=1400 audit(2857.960:26740): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2858.067233][ T31] audit: type=1400 audit(2857.990:26741): avc: denied { recv } for pid=9523 comm="kworker/1:2" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2862.946893][ T31] kauditd_printk_skb: 159 callbacks suppressed [ 2862.950437][ T31] audit: type=1400 audit(2862.870:26901): avc: denied { bpf } for pid=13393 comm="syz.2.2578" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2862.950811][ T31] audit: type=1400 audit(2862.870:26902): avc: denied { perfmon } for pid=13393 comm="syz.2.2578" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2862.951008][ T31] audit: type=1400 audit(2862.870:26903): avc: denied { perfmon } for pid=13393 comm="syz.2.2578" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2862.958875][ T31] audit: type=1400 audit(2862.890:26904): avc: denied { perfmon } for pid=13393 comm="syz.2.2578" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2862.960777][ T31] audit: type=1400 audit(2862.890:26905): avc: denied { perfmon } for pid=13393 comm="syz.2.2578" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2862.969783][ T31] audit: type=1400 audit(2862.900:26906): avc: denied { perfmon } for pid=13393 comm="syz.2.2578" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2862.976920][ T31] audit: type=1400 audit(2862.900:26907): avc: denied { bpf } for pid=13393 comm="syz.2.2578" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2863.006934][ T31] audit: type=1400 audit(2862.930:26908): avc: denied { recv } for pid=9060 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2863.017989][ T31] audit: type=1400 audit(2862.940:26909): avc: denied { map_create } for pid=13393 comm="syz.2.2578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2863.018285][ T31] audit: type=1400 audit(2862.940:26910): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2868.374561][ T31] kauditd_printk_skb: 205 callbacks suppressed [ 2868.375006][ T31] audit: type=1400 audit(2868.300:27116): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2868.387511][ T31] audit: type=1400 audit(2868.310:27117): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2868.406132][ T31] audit: type=1400 audit(2868.330:27118): avc: denied { recv } for pid=9060 comm="syz-executor" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2868.414586][ T31] audit: type=1400 audit(2868.340:27119): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2868.428504][ T31] audit: type=1400 audit(2868.360:27120): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2868.440665][ T31] audit: type=1400 audit(2868.370:27121): avc: denied { recv } for pid=12563 comm="syz.0.2309" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2868.444306][ T31] audit: type=1400 audit(2868.370:27122): avc: denied { recv } for pid=12563 comm="syz.0.2309" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2868.474743][ T31] audit: type=1400 audit(2868.400:27123): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2868.477438][ T31] audit: type=1400 audit(2868.400:27124): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2869.026983][ T31] audit: type=1400 audit(2868.950:27125): avc: denied { create } for pid=13418 comm="syz.0.2586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2873.497252][ T31] kauditd_printk_skb: 131 callbacks suppressed [ 2873.499145][ T31] audit: type=1400 audit(2873.400:27257): avc: denied { prog_load } for pid=13430 comm="syz.0.2589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2873.560474][ T31] audit: type=1400 audit(2873.450:27258): avc: denied { bpf } for pid=13430 comm="syz.0.2589" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2873.564537][ T31] audit: type=1400 audit(2873.490:27259): avc: denied { perfmon } for pid=13430 comm="syz.0.2589" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2873.727138][ T31] audit: type=1400 audit(2873.630:27260): avc: denied { perfmon } for pid=13430 comm="syz.0.2589" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2873.727751][ T31] audit: type=1400 audit(2873.630:27261): avc: denied { perfmon } for pid=13430 comm="syz.0.2589" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2873.727968][ T31] audit: type=1400 audit(2873.630:27262): avc: denied { perfmon } for pid=13430 comm="syz.0.2589" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2873.744930][ T31] audit: type=1400 audit(2873.670:27263): avc: denied { perfmon } for pid=13430 comm="syz.0.2589" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2873.757399][ T31] audit: type=1400 audit(2873.680:27264): avc: denied { bpf } for pid=13430 comm="syz.0.2589" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2873.781429][ T31] audit: type=1400 audit(2873.710:27265): avc: denied { bpf } for pid=13430 comm="syz.0.2589" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2873.785751][ T31] audit: type=1400 audit(2873.710:27266): avc: denied { prog_run } for pid=13430 comm="syz.0.2589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2873.915300][T13431] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2589'. [ 2873.940085][T13431] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2589'. [ 2878.888771][ T31] kauditd_printk_skb: 111 callbacks suppressed [ 2878.889037][ T31] audit: type=1400 audit(2878.810:27378): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2878.889179][ T31] audit: type=1400 audit(2878.820:27379): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2878.922127][ T31] audit: type=1400 audit(2878.850:27380): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2878.955029][ T31] audit: type=1400 audit(2878.880:27381): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2878.971666][ T31] audit: type=1400 audit(2878.900:27382): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2879.087122][ T31] audit: type=1400 audit(2879.010:27383): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2879.097324][ T31] audit: type=1400 audit(2879.020:27384): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2879.229620][ T31] audit: type=1400 audit(2879.150:27385): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2879.229984][ T31] audit: type=1400 audit(2879.160:27386): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2879.625891][ T31] audit: type=1400 audit(2879.550:27387): avc: denied { prog_load } for pid=13449 comm="syz.0.2593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2884.267021][ T31] kauditd_printk_skb: 155 callbacks suppressed [ 2884.267347][ T31] audit: type=1400 audit(2884.180:27543): avc: denied { execmem } for pid=13471 comm="syz.0.2601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2886.212433][ T31] audit: type=1400 audit(2886.140:27544): avc: denied { allowed } for pid=13465 comm="syz.2.2599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2886.248374][ T31] audit: type=1400 audit(2886.180:27545): avc: denied { create } for pid=13465 comm="syz.2.2599" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2886.559603][ T31] audit: type=1400 audit(2886.490:27546): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2886.570247][ T31] audit: type=1400 audit(2886.500:27547): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2886.633559][ T31] audit: type=1400 audit(2886.560:27548): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2886.635351][ T31] audit: type=1400 audit(2886.560:27549): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2886.672191][ T31] audit: type=1400 audit(2886.600:27550): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2886.702058][ T31] audit: type=1400 audit(2886.630:27551): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2886.704387][ T31] audit: type=1400 audit(2886.630:27552): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2889.461905][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 2889.467445][ T31] audit: type=1400 audit(2889.390:27588): avc: denied { map_create } for pid=13480 comm="syz.2.2604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2889.481562][ T31] audit: type=1400 audit(2889.410:27589): avc: denied { map_read map_write } for pid=13480 comm="syz.2.2604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2889.509142][ T31] audit: type=1400 audit(2889.430:27590): avc: denied { prog_load } for pid=13480 comm="syz.2.2604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2889.510666][ T31] audit: type=1400 audit(2889.440:27591): avc: denied { bpf } for pid=13480 comm="syz.2.2604" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2889.519993][ T31] audit: type=1400 audit(2889.450:27592): avc: denied { perfmon } for pid=13480 comm="syz.2.2604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2889.523282][ T31] audit: type=1400 audit(2889.450:27593): avc: denied { perfmon } for pid=13480 comm="syz.2.2604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2889.569095][ T31] audit: type=1400 audit(2889.500:27594): avc: denied { perfmon } for pid=13480 comm="syz.2.2604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2889.571740][ T31] audit: type=1400 audit(2889.500:27595): avc: denied { perfmon } for pid=13480 comm="syz.2.2604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2889.573982][ T31] audit: type=1400 audit(2889.500:27596): avc: denied { perfmon } for pid=13480 comm="syz.2.2604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2889.578996][ T31] audit: type=1400 audit(2889.500:27597): avc: denied { bpf } for pid=13480 comm="syz.2.2604" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2894.470135][ T31] kauditd_printk_skb: 134 callbacks suppressed [ 2894.470698][ T31] audit: type=1400 audit(2894.400:27732): avc: denied { recv } for pid=12563 comm="syz.0.2309" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2894.538142][ T31] audit: type=1400 audit(2894.450:27733): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2894.539990][ T31] audit: type=1400 audit(2894.470:27734): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2895.028174][ T31] audit: type=1400 audit(2894.950:27735): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2895.028339][ T31] audit: type=1400 audit(2894.960:27736): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2895.047348][ T31] audit: type=1400 audit(2894.970:27737): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2895.091272][ T31] audit: type=1400 audit(2895.020:27738): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2895.108657][ T31] audit: type=1400 audit(2895.040:27739): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2895.222671][ T31] audit: type=1400 audit(2895.150:27740): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2895.227792][ T31] audit: type=1400 audit(2895.160:27741): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=10.0.2.2 src=38484 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2896.670280][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2896.752317][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2896.850592][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2896.954253][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2897.613857][ T12] bond2 (unregistering): (slave gretap1): Releasing active interface [ 2897.712462][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2897.727357][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2897.745131][ T12] bond0 (unregistering): Released all slaves [ 2897.791379][ T12] bond1 (unregistering): (slave vlan2): Releasing active interface [ 2897.807399][ T12] bond1 (unregistering): Released all slaves [ 2897.832767][ T12] bond2 (unregistering): Released all slaves [ 2897.882166][ T12] bond3 (unregistering): Released all slaves [ 2898.197673][ T12] hsr_slave_0: left promiscuous mode [ 2898.207750][ T12] hsr_slave_1: left promiscuous mode [ 2898.254076][ T12] veth1_macvtap: left promiscuous mode [ 2898.254428][ T12] veth0_macvtap: left promiscuous mode [ 2898.254802][ T12] veth1_vlan: left promiscuous mode [ 2898.254957][ T12] veth0_vlan: left promiscuous mode [ 2899.476839][ T31] kauditd_printk_skb: 127 callbacks suppressed [ 2899.477160][ T31] audit: type=1400 audit(2899.400:27869): avc: denied { recv } for pid=3114 comm="sshd-session" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2899.513371][ T31] audit: type=1400 audit(2899.440:27870): avc: denied { module_request } for pid=13503 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2899.751184][ T31] audit: type=1400 audit(2899.680:27871): avc: denied { create } for pid=13528 comm="syz.2.2616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2899.801484][ T31] audit: type=1400 audit(2899.730:27872): avc: denied { read } for pid=13528 comm="syz.2.2616" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2899.856976][ T31] audit: type=1400 audit(2899.770:27873): avc: denied { read open } for pid=13528 comm="syz.2.2616" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2899.857356][ T31] audit: type=1400 audit(2899.770:27874): avc: denied { ioctl } for pid=13528 comm="syz.2.2616" path="/dev/ttyS3" dev="devtmpfs" ino=607 ioctlcmd=0x545c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2899.898938][ T31] audit: type=1400 audit(2899.820:27875): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=52816 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2899.900469][ T31] audit: type=1400 audit(2899.830:27876): avc: denied { recv } for pid=3115 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=52816 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 2899.916961][ T12] ------------[ cut here ]------ ** replaying previous printk message ** [ 2899.916961][ T12] ------------[ cut here ]------------ [ 2899.917242][ T12] WARNING: CPU: 0 PID: 12 at net/xfrm/xfrm_state.c:3303 xfrm_state_fini+0xd4/0x15c [ 2899.919343][ T12] Modules linked in: [ 2899.920067][ T12] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2899.920508][ T12] CPU: 0 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted syzkaller #0 PREEMPT [ 2899.920765][ T12] Hardware name: ARM-Versatile Express [ 2899.921091][ T12] Workqueue: netns cleanup_net [ 2899.921328][ T12] Call trace: [ 2899.921556][ T12] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2899.921880][ T12] r7:00000000 r6:8281f77c r5:00000000 r4:82260afc [ 2899.922563][ T12] [<80201b08>] (show_stack) from [<8021fbe4>] (dump_stack_lvl+0x54/0x7c) [ 2899.923075][ T12] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 2899.923235][ T12] r5:00000000 r4:82a77d18 [ 2899.923311][ T12] [<8021fc0c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 2899.923694][ T12] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 2899.923948][ T12] r7:8180123c [ 2899.924062][ T12] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 2899.924273][ T12] r3:8280c684 r2:00000001 r1:82247518 r0:8224ef94 [ 2899.924391][ T12] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 2899.924593][ T12] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 2899.924804][ T12] r8:00000009 r7:8243ebfc r6:df849dd4 r5:83210c00 r4:00000000 [ 2899.924947][ T12] [<80254bd0>] (warn_slowpath_fmt) from [<8180123c>] (xfrm_state_fini+0xd4/0x15c) [ 2899.925174][ T12] r10:00000001 r9:00000001 r8:829dcfe8 r7:829eee50 r6:829dcfe8 r5:84e21d80 [ 2899.925336][ T12] r4:84e21d80 [ 2899.925415][ T12] [<81801168>] (xfrm_state_fini) from [<817f23e8>] (xfrm_net_exit+0x2c/0x40) [ 2899.925596][ T12] r5:84e21d80 r4:84e21d80 [ 2899.925688][ T12] [<817f23bc>] (xfrm_net_exit) from [<81564b28>] (ops_undo_list+0xe8/0x238) [ 2899.925920][ T12] r5:84e21d80 r4:df849e98 [ 2899.926016][ T12] [<81564a40>] (ops_undo_list) from [<81566cec>] (cleanup_net+0x20c/0x384) [ 2899.926485][ T12] r10:00000000 r9:ffffffd4 r8:84e28000 r7:829dcfcc r6:829dcfa4 r5:82c1e640 [ 2899.929231][ T12] r4:84e21da0 [ 2899.936801][ T12] [<81566ae0>] (cleanup_net) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 2899.937348][ T12] r10:8300f270 r9:8301c615 r8:83210c00 r7:8300e600 r6:8301c600 r5:829dcfbc [ 2899.937676][ T12] r4:830b9700 [ 2899.937883][ T12] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 2899.938273][ T12] r10:61c88647 r9:83210c00 r8:830b972c r7:82804d40 r6:8300e600 r5:8300e620 [ 2899.938651][ T12] r4:830b9700 [ 2899.938823][ T12] [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280) [ 2899.939180][ T12] r10:00000000 r9:830b9700 r8:8027ade4 r7:df819e48 r6:830b9780 r5:83210c00 [ 2899.939544][ T12] r4:00000001 [ 2899.939693][ T12] [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2899.940008][ T12] Exception stack(0xdf849fb0 to 0xdf849ff8) [ 2899.940248][ T12] 9fa0: 00000000 00000000 00000000 00000000 [ 2899.940658][ T12] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2899.940979][ T12] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2899.941228][ T12] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 [ 2899.941494][ T12] r4:830b6200 [ 2899.943388][ T12] Rebooting in 86400 seconds.. VM DIAGNOSIS: 12:58:43 Registers: info registers vcpu 0 CPU#0 R00=df849bb0 R01=00000012 R02=0000004c R03=80070093 R04=00000000 R05=82826fa0 R06=df849ba4 R07=df849bb0 R08=00000000 R09=00000000 R10=82826ef0 R11=df849b70 R12=df849b74 R13=df849b1c R14=802e0c14 R15=802e66ac PSR=80070093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=82adbc2c R01=00000000 R02=83aca400 R03=00000001 R04=83aca400 R05=00000001 R06=81a46e90 R07=000003d9 R08=82adbcd8 R09=8078c960 R10=82adbcdc R11=df971924 R12=df9718e8 R13=df971878 R14=8078d164 R15=8078d128 PSR=20000093 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000