last executing test programs: 47.488627919s ago: executing program 3 (id=118): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x18) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeea, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$igmp6(0xa, 0x3, 0x3a) prlimit64(0x0, 0xe, 0x0, 0x0) socket(0x1e, 0x1, 0x0) chdir(&(0x7f0000000040)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x9}]}, 0x10) bind$bt_hci(r5, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) ioctl$sock_bt_hci(r4, 0x800448d2, 0x0) 47.076300671s ago: executing program 1 (id=119): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB='f\n'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000008c0)={0x14, r0, 0xfaac4106a1b87a7, 0x0, 0x0, {0xb}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setresuid(0xee01, 0x0, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002078316e00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000006000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pselect6(0x40, &(0x7f00000045c0)={0x0, 0x0, 0x8000, 0x2}, 0x0, &(0x7f0000000480)={0xf8}, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000740)={0x2, 0x0, [{0x2, 0x86, &(0x7f0000000280)=""/134}, {0x4000, 0x80, &(0x7f0000000400)=""/128}]}) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000080)=0x200000000) r4 = dup2(r3, r3) readv(r4, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/125, 0x48}], 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000040)=0x1) capset(&(0x7f0000000080)={0x20071026}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0, r5}, 0x18) 46.757307523s ago: executing program 1 (id=121): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000800), 0xffffffffffffffff) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=@ipv6_newroute={0x24, 0x18, 0x105, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x3}]}, 0x24}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x24, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x4b4d, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) readv(r1, &(0x7f00000004c0)=[{&(0x7f0000000200)=""/217, 0xd9}], 0x1) signalfd4(r1, &(0x7f0000000040)={[0x7fffffffffffffff]}, 0x8, 0x0) 46.722669353s ago: executing program 3 (id=122): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'lo\x00'}) sendmsg$nl_route_sched(r0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0xffffc000) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) getitimer(0x2, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@union={0x5, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x4, 0x4, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x5f]}}, &(0x7f00000000c0)=""/181, 0x37, 0xb5, 0x1, 0x0, 0x0, @void, @value}, 0x20) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) getsockopt$inet_int(r6, 0x0, 0x13, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000240)="7305f6ac556c2e822573e76f320b5d6a01b8d3", 0x13, 0x8800, 0x0, 0x0) 45.007758193s ago: executing program 3 (id=124): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) munlockall() ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x29, 0x2, 0x0, 0x800, 0x16, @mcast1, @mcast2, 0x80, 0x40, 0x1, 0x8fc}}) r0 = creat(0x0, 0x18) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6a471000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddb357f7adf97affffffff7d1800"}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xb, "0700f362368300"}) ioctl$TIOCGPTPEER(r4, 0x5441, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 44.061374329s ago: executing program 3 (id=128): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) syz_btf_id_by_name$bpf_lsm(0x0) sched_setscheduler(0x0, 0x5, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1a10716, &(0x7f0000000580)={[{@prjquota}, {@mblk_io_submit}, {@grpjquota_path}, {@resuid}, {@prjquota}, {@usrjquota}, {@usrjquota}, {@inode_readahead_blks}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x2}}]}, 0xff, 0x46d, &(0x7f0000001bc0)="$eJzs289vVEUcAPDve7sFBGUrIgqCVNGk8UdLCyoHE6PRxIMmJnrAY20LQRZqaE2ENFqNwaMh8W48mvgXePJk1JOJVzyaGBKixAT04pq3+17pLrullYXddD+fZGFm3+zMfPvevJ2d2Q1gYI1k/yQRd0fExYioNLLNBUYa/127sjj995XF6SRqtTf/SOrlrl5ZnK7litdty+scTSPST5O8kRhaWe382XMnp6rV2TN5fnzh1Hvj82fPPX3i1NTx2eOzpyePHDl8aOK5ZyefadPr3y6sN84svqt7Ppzbu/vVty+8Pn30wjs/fpP1d9e+xvEsjvXWeTMjWeB/Nv42rcce73ZjPfZv7XqcSbnXvWGtShFRzgfnxahEKa6fvEq88klPOwfcVtk9e3Pnw0s1YANLotc9AHqjeKPPPv8Wjzs09egLl19sfADK4r6WPxpHypE2Pho1L1x02UhEHF3658vsES3rELU26wYAALfqu2z+81S7+V8au1aU257vDQ1HxL0RsSMi7ouInRFxf0S97AMR8WCnhjpMokZa8jfOP9NL/zu4Ncjmf8/ne1vN87+0KDJcynP31OMfSo6dqM4ezP8mozG0OctPtKu8qOLlXz7v1P7K+V/2yNov5oJ5JZfKjQW6LcUzM1MLU92alF7+OGJPuV38yfJOQBIRuyNiz/qq3l4kTjzx9d5OhW4e/yq6sM9U+6qoZHEpWuIvJKvvT45vierswfHiqrjRTz+ff6NT+7cUfxdk539r8/XfUqLyV7Jyv3Z++cALa23j/K+fdfxMWV779b8su/43JW/V93Q35c99MLWwcGYiYlPyWj3f9Pzk9dcW+aJ8Fv/ogfbjf0f+miz+hyIiu4j3RcTDEbE/P3ePRMSjEXFglfh/eOmxdzsd64fzP9P2/rd8/Q83n//1J0onv/+2U/tru/8drqdG82fq97+b6Nyd4jbacjUDAADABpbWvxufpGPL6TQdG2t8h39nbE2rc/MLTx6be//0TOM79MMxlBYrXZUV66ETyVJeYyM/ma8VF8cP5evGX5TuqufHpueqMz2OHQbdtg7jP/N7qde9A247v9eCwdU6/tMe9QO487z/w+Ay/mFwGf8wuNqN/49a8vYCYCOqVXrdA6B3zP9hcBn/MLiMfxhIt/K7/tuVKK/y632JfklE2hfd6JvE/j4aTeUujO4e35gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC65L8AAAD///Uk+Ss=") syz_open_procfs$namespace(0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setregs(0xd, r3, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4204, r3, 0x2, &(0x7f0000000740)={0x0, 0x110}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 43.857508271s ago: executing program 1 (id=129): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x208080, &(0x7f00000000c0), 0x1, 0x598, &(0x7f0000000800)="$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") r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x18, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b00000000001b000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000006ffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x3ffffffffffffda, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x10, &(0x7f0000000740), 0xfe, 0x499, &(0x7f0000001780)="$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") r4 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) lseek(r4, 0x8, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="00000000da120addb7080000000000007b8af807020200000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r5, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001e00431b000000000000000007000000", @ANYBLOB], 0x28}}, 0x0) sync() bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 42.29594369s ago: executing program 3 (id=132): getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000007fc0)='./bus\x00', 0x60142, 0x0) open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001740)={0x9c02}, 0x8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000004000000000000000000850000002300000095"], 0x0, 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r3}, 0x10) r4 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r4, &(0x7f0000000640)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_buf(r4, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) connect$inet6(r4, &(0x7f0000000280)={0xa, 0x0, 0x0, @private2}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000002900000037"], 0x18}}], 0x1, 0x0) 42.148134681s ago: executing program 3 (id=134): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000400)='./file1\x00', 0x200000, &(0x7f0000000800)={[{@jqfmt_vfsv1}, {@min_batch_time={'min_batch_time', 0x3d, 0xc0}}, {@delalloc}, {@noauto_da_alloc}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7c}}, {@nouid32}, {@resgid}, {@nobarrier}, {@sysvgroups}]}, 0x1, 0x573, &(0x7f0000001140)="$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") chdir(&(0x7f0000000080)='./file0\x00') rename(&(0x7f0000000300)='./file0\x00', &(0x7f00000000c0)='./file1\x00') bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xffffffffffffffaa) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x1) fcntl$setstatus(r2, 0x4, 0x4400) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x3, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) add_key$user(&(0x7f0000000300), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000003c0)="ff", 0x1, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) 42.073596802s ago: executing program 32 (id=134): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000400)='./file1\x00', 0x200000, &(0x7f0000000800)={[{@jqfmt_vfsv1}, {@min_batch_time={'min_batch_time', 0x3d, 0xc0}}, {@delalloc}, {@noauto_da_alloc}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7c}}, {@nouid32}, {@resgid}, {@nobarrier}, {@sysvgroups}]}, 0x1, 0x573, &(0x7f0000001140)="$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") chdir(&(0x7f0000000080)='./file0\x00') rename(&(0x7f0000000300)='./file0\x00', &(0x7f00000000c0)='./file1\x00') bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xffffffffffffffaa) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x1) fcntl$setstatus(r2, 0x4, 0x4400) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x3, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) add_key$user(&(0x7f0000000300), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000003c0)="ff", 0x1, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) 42.046173732s ago: executing program 1 (id=136): pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50}, 0x50) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, &(0x7f00000003c0), 0x2, 0x47d, &(0x7f0000001300)="$eJzs289vFFUcAPDvzLZFQWhFFEFUFI2NP1paUDl40WjiQRMTPeCxtoUAhRpaEyFEqzF4NCTejUcT/wJPejHqycQr3g0JUS6gp5rZnVm2y+52F5Zdyn4+yTRvZt70ve/OvJk382YCGFh7sz9JxH0RcTEiRiuzVat5pizftSvnZv+9cm42idXVd/9OyvmuXjk3W+QtttuSz4ynEekXSV7IWktnzp6YWViYP53PTy6f/HBy6czZF46dnDk6f3T+1PShQwcPTL380vSLXYkzi+/q7k8W9+x68/0Lb88evvDBr98n+fKoi6Mdw23k2ZsF/s9qWf26pzspbAPYWpNOhvpYETpSioih/Hi+GKNRius7bzTe+LyvlQNuq+zatKn56pVV4C6WRL9rAPRHcaHP7n+LqUddjzvC5VcrN0BZ3NfyqbJmKNI8z3Dd/W037Y2Iwyv/fZNNcRPPIQAAOvVj1v95vlH/L43aPuK2fGxoLCLuj4jtEfFAROyIiAcj4qGI2BkRD7dX7PEiUT80dGP/J710qzG2kvX/XsnHttb2/4reX4yV8rmt5fiHkyPHFub357/JeAxvyuanWpTx0+t/fNVsXW3/L5uy8g+vGVxKLw3VPaCbm1meaWsAqg2XP4vYPdQo/qQ6EpBExK6I2N3Zv95WJI49+92eZpkaxp/3hdfVhXGm1W8jnqns/5Woiz9iUzXVYnxy8p5YmN8/WRwVN/rt9/PvNCv/luLvgmz/b157/NdnGUtqx2uXOi/j/J9fNr2nWT/+xsf/SPJe+Xw0ki/7eGZ5+fRUxEjyVmWr2uXT17ct5ov8Wfzj+xq3/+35Nln8j0REdhA/GhGPRcTjed2fiIgnI2Jfi/h/ee2p4x3Gn7T4d12VxT/X8PxXrULd/u88UTrx8w/Nym9v/x8sp8bzJeXz3zrareCt/HYAAACwUaTld+CTdKKaTtOJico7/Dtic7qwuLT83JHFj07NVd6VH4vhtHjSNVrzPHQqWcnfJo7y3fd0/qy4WH8gf278dene8vzE7OLCXJ9jh0G3pab9b995vf1n/iqtzVsdEfF9B9w91mvPXRprBO5A9e0/7VM9gN7Tn4fBpf3D4NL+YXA1av+fFon8PeBSD+sD9I7rPwyu9dp/z75GAnrO9R8G1021fy8JwEbX6tv45OY/+ZfobyJWbn8R6R0R6e1KjLTRQNpOrPQ9nM4TN54rhtwnAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAG9D/AQAA///nR+9m") mount$incfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) r1 = syz_usb_connect(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x77, 0x29, 0x4, 0x20, 0x424, 0x9901, 0xc257, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x43, 0x0, 0x2, 0x31, 0x7d, 0x55, 0x0, [], [{{0x9, 0x5, 0x2, 0x2, 0x200, 0x2}}, {{0x9, 0x5, 0x82, 0x2, 0x200}}]}}]}}]}}, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$uac1(r1, 0x0, &(0x7f0000000500)={0x44, &(0x7f00000001c0)={0x0, 0x13, 0x4, "f2c93366"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, 0x0, &(0x7f0000000900)={0x2c, &(0x7f0000000680)={0x20, 0xe, 0x4, "d59537c8"}, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$incfs(r2, &(0x7f00000005c0)='.pending_reads\x00', 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r3, 0xc058671e, &(0x7f0000000480)={{'\x00', 0x1}, {}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000080850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r6, 0x4b72, &(0x7f0000000600)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="010000201000"}) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x10a}]}) rename(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000200)='\xe9\x1fq\x89Y\x1e\x923aK\x00') open(&(0x7f00000000c0)='./file0\x00', 0x2000, 0x1ec) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="eb", 0x20000101}], 0x1, 0x0) fcntl$setpipe(r0, 0x407, 0x2000000) 38.920766061s ago: executing program 1 (id=143): r0 = socket(0x2a, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r4, 0x0, 0x6a) splice(r1, 0x0, r4, 0x0, 0x8ec3, 0x0) readv(r3, &(0x7f0000000080)=[{&(0x7f00000078c0)=""/110, 0x94}], 0x1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) splice(r3, 0x0, r5, 0x0, 0x800, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) close(r4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140), 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=@newqdisc={0x2c, 0x24, 0x2, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001500)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {}, {0xfff1}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x4}}]}, 0x34}}, 0x0) r7 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r7, 0x40345410, &(0x7f00000000c0)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r7, 0x5422) r8 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r8, 0x40345410, &(0x7f00000000c0)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r8, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r7, 0x40345410, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r9, &(0x7f00000002c0), 0x40000000000009f, 0x0) 38.504181053s ago: executing program 1 (id=147): syz_mount_image$exfat(&(0x7f0000000280), &(0x7f00000000c0)='./file2\x00', 0x810, &(0x7f00000018c0)=ANY=[], 0xfd, 0x1501, &(0x7f00000002c0)="$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") bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d40)={&(0x7f00000009c0)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d40)={&(0x7f00000009c0)='sched_switch\x00'}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x3676, &(0x7f000000a9c0), &(0x7f000000aa40), &(0x7f000000aa80)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r4, 0x2, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x0}, 0x20) io_uring_register$IORING_REGISTER_FILES2(r4, 0x6, &(0x7f0000001480)={0x0, 0x0, 0x20000000, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) 37.529554699s ago: executing program 33 (id=147): syz_mount_image$exfat(&(0x7f0000000280), &(0x7f00000000c0)='./file2\x00', 0x810, &(0x7f00000018c0)=ANY=[], 0xfd, 0x1501, &(0x7f00000002c0)="$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") bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d40)={&(0x7f00000009c0)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d40)={&(0x7f00000009c0)='sched_switch\x00'}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x3676, &(0x7f000000a9c0), &(0x7f000000aa40), &(0x7f000000aa80)) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r4, 0x2, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x0}, 0x20) io_uring_register$IORING_REGISTER_FILES2(r4, 0x6, &(0x7f0000001480)={0x0, 0x0, 0x20000000, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) 5.506578996s ago: executing program 2 (id=560): getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000007fc0)='./bus\x00', 0x60142, 0x0) open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001740)={0x9c02}, 0x8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000004000000000000000000850000002300000095"], &(0x7f0000000180)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r3}, 0x10) r4 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r4, &(0x7f0000000640)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_buf(r4, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1", 0x12) connect$inet6(r4, &(0x7f0000000280)={0xa, 0x0, 0x0, @private2}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000002900000037"], 0x18}}], 0x1, 0x0) 4.239257484s ago: executing program 2 (id=575): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) r2 = socket$inet(0x2, 0x2, 0x1) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000002140)={0x28, 0x0, 0x2711, @local}, 0x10) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0xe0000000}, 0x8004) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001180), r5) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r5, 0x0, 0x24044000) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x34}, 0x1, 0x0, 0x0, 0xc010}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000002400)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, @private2, @mcast2={0xff, 0x5}, 0x0, 0x8}}) 3.529163598s ago: executing program 5 (id=587): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) lseek(r1, 0x20000000007, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps\x00') readv(r4, &(0x7f00000022c0)=[{&(0x7f00000021c0)=""/200, 0xc8}], 0x1) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, 0x0}], 0x1, 0x8, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) removexattr(&(0x7f00000000c0)='./file0\x00', 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) unshare(0x2c020400) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0xb) 3.385775619s ago: executing program 2 (id=597): syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240), 0x1, 0x526, &(0x7f0000001b40)="$eJzs3d9rZFcdAPDvvTOTZndTM1WRWrEttrJbdGeSxrZBpK0g6ktBre9pTCYhZJIJmUndhKIp/gGCiAo++eSL4B8gSP8EEQr6LiqK6FafRPfKnbkxm2QmmTY/Zjf5fOBmzrm/vufc3Xvm3rmHewK4sp6OiFcjohQRz0XEZDE/Laa5PLPbW++9u28t5FMSWfb635NIinl7+8rz5Yi40dskxiPiG1+J+FZyNG57e2d1vtlsbBb5emdto97e3rm9sja/3FhurM/MTL84+9LsC7NTWeFU9axGxMtf+vOPvv/zL7/8689++w9zf731nbxYX/hY8omieAunCjBAb9+V7rHYkx+jzfMINgKloj6V0qhLAgDAMPJr/A9HxKe61/+TUepezQEAAACXSfbKRPwnicgAAACASyuNiIlI0lrRF2Ai0rRW6/Xh/WhcT5utduczS62t9cV8WUQ1KunSSrMxVfQVrkYlyfPTRR/bvfzzh/IzEfFYRPxw8lo3X1toNRdH/eMHAAAAXBE3njp4//+vybSbBgAAAC6Z6sAMAAAAcFm45QcAAIDL7d/FiwD259w73UhbAAAAwIPma6+9lk/Z3jjei29ub6223ry92Giv1ta2FmoLrc2N2nKrtdx9Z9/aSftrtlobn4v1rTv1TqPdqbe3d+bWWlvrnbmVA0NgAwAAABfosafe+X0SEbufv9adongPIMABfxp1AYCzVDrzFYGHRTn/88aoSwGMQuXENcoXUg5gdJITlg/svPObsy8LAABwPm5+/Ojz/7Fi2cm/DQAPM319AODq8XQPrq5KlNzmwxX3od7HI4OWv//n/4evLDKvFQUAgBGb6Pb8TdJa8SxwItK0Vot4tDssYCVZWmk2por7g99NVh7J89PdLZMT+wwDAAAAAAAAAAAAAAAAAAAAAAAAAD1ZlkQGAAAAXGoR6V+6IwBExM3JZycO/jpwaNSvn77+4zvznc7mdMRY8o/JfNZYRHR+Usx/PjMkAAAAADwAevfpxef0qEsDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwGXz3t23FvamAwvGzzfu374YEdV+8ctF6PGoRMT1fyZRvm+7JCJKZxB/9+2IeLxf/CTuZVlWLUrRL/61c45f7R6a/vHTiLhxBvHhKnsnb39e7Xf+pfF097P/+VcuptMa3P6l/2//SsX5fr+8/Xl0yBhPvPvL+sD4b0c8Ue7f/uzFT3r1Tw7Hf2bI+G98c2dn0LLsZxE3+37/JAdi1TtrG/X29s7tlbX55cZyY31mZvrF2ZdmX5idqi+tNBvF374xfvDJX907rv7XB8SvHqz/kfb/2SHr/99379z9SC9Z6Rf/1jP9v38fHxA/Lb77Pl2k8+U399K7vfT9nvzFb588rv6LA+q//++f9a3/rSHr/9zXv/fHIVcFAC5Ae3tndb7ZbGwekxgfYp0LTrxycbEmLr6CD+ABP+9E9t3e/8fT7eeUmx9JZCesMxbHbF6OMyjG2Ps4T882McpWCQAAOA/7F/15LktGXR4AAAAAAAAAAAAAAAAAAAC4ij7gG8LGI2LolQ/H3N1Prnz1gusLAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADDI/wIAAP//dGLgdw==") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8e}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0/file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) poll(&(0x7f0000000180), 0x0, 0x5) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB='1-2', @ANYRESDEC=0x0], 0x23) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1900000004", @ANYBLOB="000056ca7caa8f83bbf51a6b8da00cbeb25a0000000000000000000000000000000000009a04cc5e2d741eb0f5b5c375135ecaa4739f2cf92e1993e49fdc2653bcc2", @ANYRES32=0x0, @ANYRESHEX=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, 0x0, &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r6, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) r7 = userfaultfd(0x80001) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000000)) setsockopt$sock_int(r6, 0x1, 0x8, 0x0, 0x0) 3.310811229s ago: executing program 2 (id=600): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0) sched_setscheduler(r0, 0x6, &(0x7f0000000080)) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETOFFLOAD(r2, 0x5421, 0x110e22fff7) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000280)=0x1dddc6004) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0x6, 0x3, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70200000000dd26850000008600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000340)=[r7, r3, r7, r7, r3, r8], 0x6) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r9}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) r10 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r10, 0x0, 0xfffffffffffffffe}, 0x18) r11 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="7fff000000000000240012800b000100627269646765"], 0x44}}, 0x0) 3.092114241s ago: executing program 5 (id=609): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB='f\n'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000008c0)={0x14, r0, 0xfaac4106a1b87a7, 0x0, 0x0, {0xb}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setresuid(0xee01, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000980), 0x76, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pselect6(0x40, &(0x7f00000045c0)={0x0, 0x0, 0x8000, 0x2}, 0x0, &(0x7f0000000480)={0xf8}, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000740)={0x2, 0x0, [{0x2, 0x86, &(0x7f0000000280)=""/134}, {0x4000, 0x80, &(0x7f0000000400)=""/128}]}) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000080)=0x200000000) r4 = dup2(r3, r3) readv(r4, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/125, 0x48}], 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000040)=0x1) capset(&(0x7f0000000080)={0x20071026}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0, r5}, 0x18) 3.091779831s ago: executing program 5 (id=610): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1e7d, 0x2cf6, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x2, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x7}}}}]}}]}}, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b000000000000000000000000000400", @ANYRES32=0x0, @ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r4 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x40, 0x1b1c, 0x1c06, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0xd71}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r4, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) syz_usb_control_io(r4, &(0x7f0000000840)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x7, {0x7, 0x0, "a358457294"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000540)=@framed={{}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x3}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x101800, 0x81) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000400)={0x2c, &(0x7f0000000280)={0x0, 0x21, 0x7, {0x7, 0x0, "3d7da32915"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000480)={0x2c, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x20, 0x1, 0x3, "5f68dd"}, 0x0}) 2.353809645s ago: executing program 2 (id=620): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$igmp(0x2, 0x3, 0x2) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x40047451, 0x2000000c) ptrace(0x10, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)={0x1fc, r7, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x1b0, 0x8, 0x0, 0x1, [{0x158, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0xec, 0x9, 0x0, 0x1, [{0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x2, @mcast2, 0x6}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "eff93d58460ea431f2cb4a6894ddb2834088d7445bf5afdd0619ce173f1db717"}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "491bc0be1dc1f88092e741a88b64f6dd9218ad21b44b472e44f1d0807ee6675c"}]}]}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x4004840}, 0x40000) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x2000141a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='mm_page_alloc\x00'}, 0x54) ioctl$TUNSETOFFLOAD(r0, 0x40047451, 0x2000000c) 2.330884875s ago: executing program 4 (id=622): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB='f\n'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000008c0)={0x14, r0, 0xfaac4106a1b87a7, 0x0, 0x0, {0xb}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setresuid(0xee01, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000980), 0x76, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pselect6(0x40, &(0x7f00000045c0)={0x0, 0x0, 0x8000, 0x2}, 0x0, &(0x7f0000000480)={0xf8}, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000740)={0x2, 0x0, [{0x2, 0x86, &(0x7f0000000280)=""/134}, {0x4000, 0x80, &(0x7f0000000400)=""/128}]}) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000080)=0x200000000) r4 = dup2(r3, r3) readv(r4, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/125, 0x48}], 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000040)=0x1) capset(&(0x7f0000000080)={0x20071026}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0, r5}, 0x18) 2.299719935s ago: executing program 4 (id=623): getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000004000000000000000000850000002300000095"], &(0x7f0000000180)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r2}, 0x10) r3 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r3, &(0x7f0000000640)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000000040), 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x0, 0x0, @private2}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000002900000037"], 0x18}}], 0x1, 0x0) 2.115237966s ago: executing program 6 (id=625): bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffc6e) openat$pfkey(0xffffff9c, 0x0, 0x101000, 0x0) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0) socket(0x11, 0x800000003, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32, @ANYBLOB="80008f000a010219b5aaaaaaaa0d0000"], 0x28}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r4) mkdir(&(0x7f0000000100)='./control\x00', 0x0) rmdir(&(0x7f0000000040)='./control\x00') r5 = openat$cgroup_int(r4, &(0x7f0000000080)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000740), 0x12) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000041c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="8c834f8d421562b70f9beb1777831a8b22ee562d436ae8acef2060cb5eb23e7370fb82d171381b7e96899f", @ANYRES16=r6, @ANYBLOB="0100000000000000000004000000"], 0x14}}, 0x0) 1.621340879s ago: executing program 6 (id=628): mkdir(0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(r1, 0x0, 0x15) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x0, {0xffffffffffffffff}}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 1.431180991s ago: executing program 4 (id=629): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) r4 = socket$inet6(0xa, 0x5, 0xa) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000600)={'gretap0\x00', 0x0, 0x10, 0x80, 0x0, 0x40, {{0x10, 0x4, 0x3, 0x10, 0x40, 0x66, 0x0, 0x9, 0x29, 0x0, @multicast2, @remote, {[@timestamp_addr={0x44, 0x4, 0x33, 0x1, 0x2}, @noop, @end, @lsrr={0x83, 0x7, 0x7f, [@loopback]}, @timestamp_prespec={0x44, 0x1c, 0x84, 0x3, 0xe, [{@remote}, {@dev={0xac, 0x14, 0x14, 0x28}, 0x8000}, {@empty, 0x2}]}]}}}}}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000180)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x2, r5}) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = dup(r6) ioctl$TCSETSF(r7, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x515f3157, 0x0, "78e114100985a79874342a70e113343972d01f"}) write$UHID_INPUT(r7, &(0x7f0000001040)={0xd, {"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", 0x1010}}, 0x1b7) read$FUSE(r7, &(0x7f0000002080)={0x2020}, 0x2) mincore(&(0x7f0000248000/0x4000)=nil, 0x4000, 0xffffffffffffffff) bind$tipc(r3, &(0x7f0000000340)=@name={0x1e, 0x2, 0x3, {{0x2}, 0x3}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000"], 0x48) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x15) sendmsg$tipc(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x3, {{}, 0x2}}, 0x10, 0x0}, 0x0) ustat(0x5, &(0x7f0000000240)) 1.4305968s ago: executing program 6 (id=639): getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000004000000000000000000850000002300000095"], &(0x7f0000000180)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r2}, 0x10) r3 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r3, &(0x7f0000000640)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000000040), 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x0, 0x0, @private2}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000002900000037"], 0x18}}], 0x1, 0x0) 1.171632872s ago: executing program 0 (id=630): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = syz_mount_image$fuse(0x0, &(0x7f0000001040)='./file2\x00', 0x4044, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}, {@metacopy_on}], [], 0x2c}) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000340), 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000580)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB='\x00'/16, @ANYRES32=0x0, @ANYBLOB="ac1414aa000000000000000010000000000000000000000007000000"], 0x30}, 0x0) renameat2(r1, &(0x7f0000000380)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r2, &(0x7f0000000040)='./file1\x00', 0x2) 1.088140213s ago: executing program 0 (id=631): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0}, &(0x7f00000002c0), &(0x7f0000000600)}, 0x20) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff"], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c250000000000f8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fdffffff850000002d000000950000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r8 = eventfd(0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000080)={0x1, 0x7f}) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000240)=r8) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000040)={0x1, r8}) 1.087891432s ago: executing program 0 (id=632): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB='f\n'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000008c0)={0x14, r0, 0xfaac4106a1b87a7, 0x0, 0x0, {0xb}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setresuid(0xee01, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000980), 0x76, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pselect6(0x40, &(0x7f00000045c0)={0x0, 0x0, 0x8000, 0x2}, 0x0, &(0x7f0000000480)={0xf8}, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000740)={0x2, 0x0, [{0x2, 0x86, &(0x7f0000000280)=""/134}, {0x4000, 0x80, &(0x7f0000000400)=""/128}]}) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000080)=0x200000000) r4 = dup2(r3, r3) readv(r4, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/125, 0x48}], 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000040)=0x1) capset(&(0x7f0000000080)={0x20071026}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0, r5}, 0x18) 1.040466003s ago: executing program 0 (id=633): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB='f\n'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000008c0)={0x14, r0, 0xfaac4106a1b87a7, 0x0, 0x0, {0xb}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setresuid(0xee01, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000980), 0x76, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pselect6(0x40, &(0x7f00000045c0)={0x0, 0x0, 0x8000, 0x2}, 0x0, &(0x7f0000000480)={0xf8}, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000740)={0x2, 0x0, [{0x2, 0x86, &(0x7f0000000280)=""/134}, {0x4000, 0x80, &(0x7f0000000400)=""/128}]}) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000080)=0x200000000) r4 = dup2(r3, r3) readv(r4, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/125, 0x48}], 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000040)=0x1) capset(&(0x7f0000000080)={0x20071026}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0, r5}, 0x18) 996.613853ms ago: executing program 0 (id=634): getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000007fc0)='./bus\x00', 0x60142, 0x0) open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001740)={0x9c02}, 0x8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000004000000000000000000850000002300000095"], &(0x7f0000000180)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) r4 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r4, &(0x7f0000000640)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_buf(r4, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) connect$inet6(r4, &(0x7f0000000280)={0xa, 0x0, 0x0, @private2}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000002900000037"], 0x18}}], 0x1, 0x0) 850.147704ms ago: executing program 4 (id=635): mkdir(0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf090000000000005509010000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(r0, 0x0, 0x15) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x0, {0xffffffffffffffff}}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) 812.359074ms ago: executing program 4 (id=636): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB='f\n'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setresuid(0xee01, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000980), 0x76, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002078316e00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000006000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pselect6(0x40, &(0x7f00000045c0)={0x0, 0x0, 0x8000, 0x2}, 0x0, &(0x7f0000000480)={0xf8}, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000740)={0x2, 0x0, [{0x2, 0x86, &(0x7f0000000280)=""/134}, {0x4000, 0x80, &(0x7f0000000400)=""/128}]}) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x200000000) r3 = dup2(r2, r2) readv(r3, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/125, 0x48}], 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000040)=0x1) capset(&(0x7f0000000080)={0x20071026}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0, r4}, 0x18) 516.092286ms ago: executing program 6 (id=637): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) r2 = openat$rtc(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000100)=ANY=[@ANYBLOB='N-N:N/8N'], 0x6a) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r3) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) readv(r2, &(0x7f00000004c0)=[{&(0x7f00000012c0)=""/191, 0x4}], 0x1) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) syz_emit_ethernet(0xfa, &(0x7f00000005c0)={@random="81d99bf9efa8", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @void, {@llc_tr={0x11, {@llc={0xd4, 0xaa, "af", "224b3bf6f0e6022d73867e60b881f6e4219c82892b2205006fe6721291f5539af33fc1426b8127dca74d4d37e0b929eccbb93230cce4e609b4551bdf90ba6f887820aed53660092b3d2b555f13dcaf54f72ecb73a25f56667ffcda596f7004c3a5e7b3b25df7bd5c247448bdbcd0a68007516a611bfe6dc9ae22fdc76d686c0a0a2e484ce3e0db05be6d842ac7589203b9a195a26df8069a58c2c715b030d76d47dad04b7ff0a22111b10cad4dc86c5ca9419ca7d9501efbe050cd4d563d1efad04f3d4c4a4226322c01211521701bbfe3e7e33fc630f127bbe6e73f44f0c5efa688bf42154c6e5e46"}}}}}, &(0x7f00000003c0)={0x0, 0x4, [0x806, 0xc4b, 0x4cf, 0x101]}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@private=0xa010100, 0x0, 0x0, 0x0, 0xb7, 0xffffffff}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) syz_open_dev$usbfs(&(0x7f0000000180), 0x4, 0x101740) 515.819526ms ago: executing program 4 (id=638): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) getrlimit(0x4, &(0x7f0000000780)) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}], [], 0x2c}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r5 = gettid() r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002d80), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002d00), &(0x7f0000002d40)='./file0\x00', 0x0, &(0x7f00000023c0)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) read$FUSE(r6, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r6, &(0x7f0000000000)={0x50, 0x0, r7}, 0x50) syz_fuse_handle_req(r6, &(0x7f0000004e80)="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", 0x2000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) rt_sigqueueinfo(r5, 0x21, &(0x7f0000002d00)={0x0, 0x0, 0xffffffff}) epoll_create(0x1) lseek(r4, 0x2000000000000000, 0x1) socket$netlink(0x10, 0x3, 0x0) setuid(0x0) 370.206077ms ago: executing program 6 (id=640): mkdir(0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(r1, 0x0, 0x15) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, 0x0, {0xffffffffffffffff}}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 318.348147ms ago: executing program 6 (id=641): getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f0000007fc0)='./bus\x00', 0x60142, 0x0) open(&(0x7f0000000380)='./file1\x00', 0x42042, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001740)={0x9c02}, 0x8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000004000000000000000000850000002300000095"], &(0x7f0000000180)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) r4 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r4, &(0x7f0000000640)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_buf(r4, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) connect$inet6(r4, &(0x7f0000000280)={0xa, 0x0, 0x0, @private2}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000002900000037"], 0x18}}], 0x1, 0x0) 164.132978ms ago: executing program 2 (id=642): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xb, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x6) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={0x0}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000500)={r5, 0x0, 0x0}, 0x20) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'batadv_slave_1\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x3, 0x0}}}) 118.789648ms ago: executing program 0 (id=643): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CAP_X86_DISABLE_EXITS(r1, 0x4068aea3, &(0x7f00000002c0)={0x8f, 0x0, 0xe}) r2 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000000018105e04da070000000000010902240001000000000904000009030000000921000000012222000905810308"], 0x0) syz_usb_control_io$hid(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="00222200000006231306e53f070c0000000a0000070900be008300"], 0x0}, 0x0) syz_open_dev$hidraw(&(0x7f0000000080), 0x0, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000040)=ANY=[], 0x0) syz_usb_ep_write(r2, 0x81, 0x1, &(0x7f0000000000)='B') ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8912, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0xc000, &(0x7f0000000380), 0x2, 0x25e, &(0x7f00000006c0)="$eJzs3T+IHGUcBuB3Znc8L1kkaiOIf0BE9OCInWATG4WAhCAiqBARsVESISbYZa1sLLRWSWUTxM5oKWmCjSJYnXrF2Qh6WHhYaLGyN7t67u2h3u7thJvngWFnduab3zfsvN9ssbMToLWOJTmRpJNkJUmVpNi5wb31dGy0eHn5+plkMHjql2J7u3q5Nm53NEk/ySNJrpVFXukmF68+t/Hb2hMPvH2huv/Dq88uL/QgRzY31p/c+uDUW5+cfPjiV9/8dKrIifT+cVzzV0x5r1sktx1EsRtE0W26B/wXp9/4+Nth7m9Pct92/quUqT+8d87fdK3KQ+/v1fbdn7++c5F9BeZvMKiG18D+AGidMkkvRbmapJ4vy9XV+jv8d50j5avnzr++8vK5C2dfanqkAuall6w//tnSp0cn8v9jp84/cHgN8//06SvfD+e3OhMrB0vNdAo4WHfVL8P8r7xw6cFM5v/mhvoFLMye+QcOPfmH9pJ/aC/5h/aSf2gv+YdDrBrP9Keunk/+q9GvCPfbHmiC6z+0l/xDe+3MPwDQLoOlhm9ABhrT9PgDAAAAAAAAAAAAAAAAAADsdnn5+pnxtKiaX7yXbD6WpDutfmf7ecTjBxIe+bUYbvaXom42k+fvmXEHM/qo4buvb/mh2fpf3t1s/Utnk/6bSY53u7vPv2J0/u3frf+yvnpxxgL/UzGx/Ogzi60/6Y8rzdY/uZZ8Phx/jk8bf8rckb8Hmcnxp7fzL5b36bXfZ9wBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC/NnAAAA///QS3XU") mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r4, 0x800c6613, &(0x7f0000000140)=@v1={0x0, @aes128, 0x4, @desc3}) eventfd2(0x44, 0x80001) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r5, &(0x7f0000000340)={0x31, 0x6, 0x0, {0x5, 0x5, 0x8, 0x0, 'syztnl0\x00'}}, 0x31) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @empty}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000240)={'erspan0\x00', 0x0, 0x0, 0x8000, 0x7fff, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0x3, 0x0, 0x0, @remote, @initdev={0xac, 0x1e, 0xfc, 0x0}}}}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x2004cb], 0x0, 0x200}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 88.405009ms ago: executing program 5 (id=644): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB='f\n'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000008c0)={0x14, r0, 0xfaac4106a1b87a7, 0x0, 0x0, {0xb}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setresuid(0xee01, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000980), 0x76, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pselect6(0x40, &(0x7f00000045c0)={0x0, 0x0, 0x8000, 0x2}, 0x0, &(0x7f0000000480)={0xf8}, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000740)={0x2, 0x0, [{0x2, 0x86, &(0x7f0000000280)=""/134}, {0x4000, 0x80, &(0x7f0000000400)=""/128}]}) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000080)=0x200000000) r4 = dup2(r3, r3) readv(r4, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/125, 0x48}], 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000040)=0x1) capset(&(0x7f0000000080)={0x20071026}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0, r5}, 0x18) 230.45µs ago: executing program 5 (id=645): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB='f\n'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000008c0)={0x14, r0, 0xfaac4106a1b87a7, 0x0, 0x0, {0xb}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setresuid(0xee01, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000980), 0x76, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pselect6(0x40, &(0x7f00000045c0)={0x0, 0x0, 0x8000, 0x2}, 0x0, &(0x7f0000000480)={0xf8}, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000740)={0x2, 0x0, [{0x2, 0x86, &(0x7f0000000280)=""/134}, {0x4000, 0x80, &(0x7f0000000400)=""/128}]}) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000080)=0x200000000) r4 = dup2(r3, r3) readv(r4, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/125, 0x48}], 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r4, 0x4004af61, &(0x7f0000000040)=0x1) capset(&(0x7f0000000080)={0x20071026}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0, r5}, 0x18) 0s ago: executing program 5 (id=646): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB='f\n'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setresuid(0xee01, 0x0, 0xffffffffffffffff) syz_open_dev$usbfs(&(0x7f0000000980), 0x76, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002078316e00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000006000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) pselect6(0x40, &(0x7f00000045c0)={0x0, 0x0, 0x8000, 0x2}, 0x0, &(0x7f0000000480)={0xf8}, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000740)={0x2, 0x0, [{0x2, 0x86, &(0x7f0000000280)=""/134}, {0x4000, 0x80, &(0x7f0000000400)=""/128}]}) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x200000000) r3 = dup2(r2, r2) readv(r3, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/125, 0x48}], 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000040)=0x1) capset(&(0x7f0000000080)={0x20071026}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0, r4}, 0x18) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.17' (ED25519) to the list of known hosts. [ 25.565931][ T28] audit: type=1400 audit(1731972043.316:66): avc: denied { mounton } for pid=286 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.567117][ T286] cgroup: Unknown subsys name 'net' [ 25.588410][ T28] audit: type=1400 audit(1731972043.316:67): avc: denied { mount } for pid=286 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.615350][ T28] audit: type=1400 audit(1731972043.346:68): avc: denied { unmount } for pid=286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.615516][ T286] cgroup: Unknown subsys name 'devices' [ 25.759918][ T286] cgroup: Unknown subsys name 'hugetlb' [ 25.765328][ T286] cgroup: Unknown subsys name 'rlimit' [ 25.865749][ T28] audit: type=1400 audit(1731972043.616:69): avc: denied { setattr } for pid=286 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.888748][ T28] audit: type=1400 audit(1731972043.616:70): avc: denied { mounton } for pid=286 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.913263][ T28] audit: type=1400 audit(1731972043.616:71): avc: denied { mount } for pid=286 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.922864][ T289] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 25.945257][ T28] audit: type=1400 audit(1731972043.706:72): avc: denied { relabelto } for pid=289 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.970447][ T28] audit: type=1400 audit(1731972043.706:73): avc: denied { write } for pid=289 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.006379][ T28] audit: type=1400 audit(1731972043.756:74): avc: denied { read } for pid=286 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.006867][ T286] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.032424][ T28] audit: type=1400 audit(1731972043.756:75): avc: denied { open } for pid=286 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.699527][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.706463][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.713851][ T296] device bridge_slave_0 entered promiscuous mode [ 26.735436][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.742299][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.749597][ T296] device bridge_slave_1 entered promiscuous mode [ 26.759618][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.766459][ T300] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.773768][ T300] device bridge_slave_0 entered promiscuous mode [ 26.780365][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.787180][ T298] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.794519][ T298] device bridge_slave_0 entered promiscuous mode [ 26.815006][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.821874][ T300] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.829204][ T300] device bridge_slave_1 entered promiscuous mode [ 26.835524][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.842403][ T298] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.849631][ T298] device bridge_slave_1 entered promiscuous mode [ 26.862876][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.869810][ T299] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.876941][ T299] device bridge_slave_0 entered promiscuous mode [ 26.890266][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.897122][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.904476][ T297] device bridge_slave_0 entered promiscuous mode [ 26.911030][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.917923][ T299] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.925088][ T299] device bridge_slave_1 entered promiscuous mode [ 26.942469][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.949337][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.956519][ T297] device bridge_slave_1 entered promiscuous mode [ 27.174265][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.181285][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.188370][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.195139][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.212929][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.219794][ T299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.226886][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.233695][ T299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.245072][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.251948][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.259133][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.265897][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.278939][ T300] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.285874][ T300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.293003][ T300] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.299772][ T300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.324686][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.331558][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.338663][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.345423][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.381455][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.388660][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.395634][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.403473][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.410943][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.418252][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.425237][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.432376][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.439551][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.446488][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.453448][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.471950][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.493994][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.502136][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.510296][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.517123][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.524484][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.533213][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.540072][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.547263][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.555311][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.562216][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.584435][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.592443][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.599279][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.606424][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.613937][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.621414][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.629404][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.636241][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.643541][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.651474][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.659484][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.666301][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.675481][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.683469][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.703250][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.711608][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.719699][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.726528][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.733886][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.742727][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.750773][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.757605][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.764898][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.772325][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.779677][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.787460][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.795354][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.803342][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.811281][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.819262][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.827043][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.835232][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.843404][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.850249][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.858866][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.866803][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.887776][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.895949][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.904592][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.911467][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.919739][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.927576][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.935499][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.943518][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.967442][ T300] device veth0_vlan entered promiscuous mode [ 27.978014][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.986881][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.995050][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.003096][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.011424][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.019719][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.027408][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.035360][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.043602][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.051970][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.059345][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.077091][ T297] device veth0_vlan entered promiscuous mode [ 28.084722][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 28.092794][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.100654][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.109833][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.117074][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.124658][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.132348][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.146798][ T298] device veth0_vlan entered promiscuous mode [ 28.155525][ T299] device veth0_vlan entered promiscuous mode [ 28.161677][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.169061][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.176280][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.184586][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.192931][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.200932][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.208932][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.217103][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.225328][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.232610][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.241071][ T300] device veth1_macvtap entered promiscuous mode [ 28.252566][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.260850][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.282672][ T298] device veth1_macvtap entered promiscuous mode [ 28.293165][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.301627][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.310152][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.318560][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.326668][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.335039][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.351703][ T299] device veth1_macvtap entered promiscuous mode [ 28.362475][ T297] device veth1_macvtap entered promiscuous mode [ 28.369732][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.378407][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.386735][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.397301][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.405413][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.414428][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.421843][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.438467][ T296] device veth0_vlan entered promiscuous mode [ 28.457549][ T296] device veth1_macvtap entered promiscuous mode [ 28.519230][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.527654][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.536278][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.544472][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.552958][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.560627][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.568785][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.576867][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.586672][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.596489][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.606165][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.616948][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.626606][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.658673][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.669084][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.679302][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.690052][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.770755][ T329] capability: warning: `syz.0.1' uses deprecated v2 capabilities in a way that may be insecure [ 28.824960][ T333] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 28.834321][ T336] loop2: detected capacity change from 0 to 128 [ 28.859102][ T336] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 28.868993][ T336] ext4 filesystem being mounted at /0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038 (0x7fffffff) [ 30.144273][ T297] EXT4-fs (loop2): unmounting filesystem. [ 30.156893][ T350] loop4: detected capacity change from 0 to 128 [ 30.176990][ T352] loop3: detected capacity change from 0 to 1024 [ 30.260529][ T362] loop2: detected capacity change from 0 to 512 [ 30.282675][ T362] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 30.297989][ T352] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 30.587987][ T28] kauditd_printk_skb: 50 callbacks suppressed [ 30.588047][ T28] audit: type=1400 audit(1731972048.186:126): avc: denied { create } for pid=349 comm="syz.4.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 30.614734][ T28] audit: type=1400 audit(1731972048.196:127): avc: denied { setopt } for pid=349 comm="syz.4.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 30.634425][ T28] audit: type=1400 audit(1731972048.326:128): avc: denied { read } for pid=349 comm="syz.4.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 30.666480][ T362] EXT4-fs error (device loop2): ext4_do_update_inode:5226: inode #3: comm syz.2.7: corrupted inode contents [ 30.680300][ T362] EXT4-fs error (device loop2): ext4_dirty_inode:6088: inode #3: comm syz.2.7: mark_inode_dirty error [ 30.692977][ T362] EXT4-fs error (device loop2): ext4_do_update_inode:5226: inode #3: comm syz.2.7: corrupted inode contents [ 30.717915][ T362] EXT4-fs error (device loop2): __ext4_ext_dirty:202: inode #3: comm syz.2.7: mark_inode_dirty error [ 30.730085][ T362] Quota error (device loop2): write_blk: dquota write failed [ 30.738330][ T362] Quota error (device loop2): qtree_write_dquot: Error -117 occurred while creating quota [ 30.748708][ T362] EXT4-fs error (device loop2): ext4_acquire_dquot:6787: comm syz.2.7: Failed to acquire dquot type 0 [ 30.761870][ T362] EXT4-fs error (device loop2): ext4_do_update_inode:5226: inode #16: comm syz.2.7: corrupted inode contents [ 30.775118][ T362] EXT4-fs error (device loop2): ext4_dirty_inode:6088: inode #16: comm syz.2.7: mark_inode_dirty error [ 30.788030][ T362] EXT4-fs error (device loop2): ext4_do_update_inode:5226: inode #16: comm syz.2.7: corrupted inode contents [ 30.802621][ T362] EXT4-fs error (device loop2): __ext4_ext_dirty:202: inode #16: comm syz.2.7: mark_inode_dirty error [ 30.810551][ T28] audit: type=1400 audit(1731972048.566:129): avc: denied { unmount } for pid=300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 30.813994][ T362] EXT4-fs error (device loop2): ext4_do_update_inode:5226: inode #16: comm syz.2.7: corrupted inode contents [ 30.844906][ T362] EXT4-fs error (device loop2) in ext4_orphan_del:305: Corrupt filesystem [ 30.984489][ T362] EXT4-fs error (device loop2): ext4_do_update_inode:5226: inode #16: comm syz.2.7: corrupted inode contents [ 31.176091][ T28] audit: type=1400 audit(1731972048.926:130): avc: denied { create } for pid=377 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 31.189876][ T362] EXT4-fs error (device loop2): ext4_truncate:4313: inode #16: comm syz.2.7: mark_inode_dirty error [ 31.213678][ T298] EXT4-fs (loop3): unmounting filesystem. [ 31.219587][ T362] EXT4-fs error (device loop2) in ext4_process_orphan:347: Corrupt filesystem [ 31.230953][ T362] EXT4-fs (loop2): 1 truncate cleaned up [ 31.236417][ T362] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 31.245594][ T362] ext4 filesystem being mounted at /1/file1 supports timestamps until 2038 (0x7fffffff) [ 31.303705][ T383] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 31.310778][ T383] IPv6: NLM_F_CREATE should be set when creating new route [ 31.395921][ T383] netlink: 'syz.1.14': attribute type 27 has an invalid length. [ 31.767239][ T28] audit: type=1400 audit(1731972049.516:131): avc: denied { read write } for pid=381 comm="syz.1.14" name="fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 31.801274][ T28] audit: type=1400 audit(1731972049.556:132): avc: denied { open } for pid=381 comm="syz.1.14" path="/dev/fuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 31.804284][ T383] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.831477][ T383] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.852799][ T28] audit: type=1400 audit(1731972049.556:133): avc: denied { mounton } for pid=381 comm="syz.1.14" path="/2/file0" dev="tmpfs" ino=27 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 31.870150][ T393] netlink: 256 bytes leftover after parsing attributes in process `syz.1.14'. [ 32.038085][ T297] EXT4-fs (loop2): unmounting filesystem. [ 32.182408][ T401] loop2: detected capacity change from 0 to 1024 [ 33.126085][ T430] loop0: detected capacity change from 0 to 512 [ 33.134468][ T430] EXT4-fs: Ignoring removed i_version option [ 33.145824][ T401] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 33.155122][ T430] EXT4-fs: Ignoring removed nobh option [ 33.199996][ T430] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 33.237819][ T430] EXT4-fs (loop0): can't mount with commit=14, fs mounted w/o journal [ 33.386399][ T392] syz.3.13 (392) used greatest stack depth: 19336 bytes left [ 36.121730][ T446] overlayfs: failed to resolve './file1': -2 [ 36.367855][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 36.367872][ T28] audit: type=1400 audit(1731972051.546:151): avc: denied { ioctl } for pid=438 comm="syz.1.21" path="socket:[16453]" dev="sockfs" ino=16453 ioctlcmd=0x48ca scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 36.375243][ T441] loop4: detected capacity change from 0 to 512 [ 36.424086][ T441] ======================================================= [ 36.424086][ T441] WARNING: The mand mount option has been deprecated and [ 36.424086][ T441] and is ignored by this kernel. Remove the mand [ 36.424086][ T441] option from the mount to silence this warning. [ 36.424086][ T441] ======================================================= [ 36.475786][ T456] loop0: detected capacity change from 0 to 512 [ 36.504573][ T456] EXT4-fs warning (device loop0): ext4_block_to_path:107: block 3279945729 > max in inode 13 [ 36.533030][ T456] EXT4-fs warning (device loop0): ext4_block_to_path:107: block 3279945730 > max in inode 13 [ 36.543343][ T456] EXT4-fs (loop0): 1 truncate cleaned up [ 36.548857][ T456] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 36.566850][ T460] loop3: detected capacity change from 0 to 512 [ 36.573817][ T460] EXT4-fs: Ignoring removed mblk_io_submit option [ 36.591018][ T441] Quota error (device loop4): do_check_range: Getting dqdh_entries 1536 out of range 0-14 [ 36.600894][ T460] EXT4-fs: Ignoring removed i_version option [ 36.606955][ T441] Quota error (device loop4): qtree_write_dquot: Error -117 occurred while creating quota [ 36.678123][ T463] netlink: 4 bytes leftover after parsing attributes in process `syz.1.23'. [ 36.722584][ T441] EXT4-fs error (device loop4): ext4_acquire_dquot:6787: comm syz.4.22: Failed to acquire dquot type 1 [ 36.885707][ T297] EXT4-fs (loop2): unmounting filesystem. [ 36.887858][ T441] EXT4-fs (loop4): 1 truncate cleaned up [ 36.917143][ T460] EXT4-fs error (device loop3): __ext4_iget:5057: inode #11: block 1: comm syz.3.25: invalid block [ 36.939187][ T441] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 36.951913][ T441] ext4 filesystem being mounted at /4/file0 supports timestamps until 2038 (0x7fffffff) [ 36.961774][ T460] EXT4-fs (loop3): Remounting filesystem read-only [ 36.987836][ T460] EXT4-fs error (device loop3): ext4_orphan_get:1401: comm syz.3.25: couldn't read orphan inode 11 (err -117) [ 37.000309][ T441] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 3: comm syz.4.22: path /4/file0: bad entry in directory: rec_len is smaller than minimal - offset=323, inode=0, rec_len=0, size=4096 fake=0 [ 37.020572][ T460] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 37.143178][ T28] audit: type=1400 audit(1731972054.896:152): avc: denied { setattr } for pid=455 comm="syz.0.24" path="/5/file0" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 37.143198][ T469] fscrypt (loop0, inode 2): Error -61 getting encryption context [ 37.559712][ T28] audit: type=1400 audit(1731972055.316:153): avc: denied { append } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 37.582718][ T298] EXT4-fs (loop3): unmounting filesystem. [ 37.914826][ T28] audit: type=1400 audit(1731972055.316:154): avc: denied { open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 37.941499][ T300] EXT4-fs (loop4): unmounting filesystem. [ 37.946396][ T28] audit: type=1400 audit(1731972055.316:155): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 38.034420][ T296] EXT4-fs (loop0): unmounting filesystem. [ 38.155605][ T489] loop2: detected capacity change from 0 to 512 [ 38.631520][ T489] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 38.700367][ T497] loop0: detected capacity change from 0 to 16 [ 38.993955][ T501] loop1: detected capacity change from 0 to 1024 [ 39.003453][ T489] EXT4-fs (loop2): 1 truncate cleaned up [ 39.010418][ T489] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 39.054806][ T28] audit: type=1400 audit(1731972056.806:156): avc: denied { create } for pid=488 comm="syz.2.31" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 39.075068][ T28] audit: type=1400 audit(1731972056.806:157): avc: denied { ioctl } for pid=488 comm="syz.2.31" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=16527 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 39.080244][ T501] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 39.845031][ T28] audit: type=1400 audit(1731972057.006:158): avc: denied { unlink } for pid=498 comm="syz.4.33" name="#1" dev="tmpfs" ino=56 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 39.992792][ T297] EXT4-fs (loop2): unmounting filesystem. [ 40.980630][ T299] EXT4-fs (loop1): unmounting filesystem. [ 41.012714][ T556] input: syz0 as /devices/virtual/input/input4 [ 41.364211][ T567] xt_TCPMSS: Only works on TCP SYN packets [ 41.372895][ T563] loop2: detected capacity change from 0 to 512 [ 41.413031][ T563] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 41.422414][ T563] ext4 filesystem being mounted at /7/file0 supports timestamps until 2038 (0x7fffffff) [ 42.381900][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 42.381916][ T28] audit: type=1400 audit(2000000002.230:174): avc: denied { unmount } for pid=296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 42.519422][ T297] EXT4-fs (loop2): unmounting filesystem. [ 42.547950][ T583] loop1: detected capacity change from 0 to 1024 [ 42.554435][ T583] ext4: Bad value for 'sb' [ 42.562741][ T587] loop4: detected capacity change from 0 to 512 [ 42.572799][ T587] EXT4-fs (loop4): couldn't mount as ext2 due to feature incompatibilities [ 42.842299][ T28] audit: type=1400 audit(2000000002.690:175): avc: denied { create } for pid=582 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 42.870422][ T28] audit: type=1400 audit(2000000002.690:176): avc: denied { write } for pid=582 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 43.567876][ T591] netlink: 68 bytes leftover after parsing attributes in process `syz.4.43'. [ 44.946606][ T28] audit: type=1400 audit(2000000004.050:177): avc: denied { read } for pid=598 comm="syz.4.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.098780][ T28] audit: type=1400 audit(2000000004.160:178): avc: denied { ioctl } for pid=598 comm="syz.4.49" path="socket:[16651]" dev="sockfs" ino=16651 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 46.110249][ T613] loop4: detected capacity change from 0 to 1024 [ 46.124045][ T28] audit: type=1400 audit(2000000004.760:179): avc: denied { write } for pid=597 comm="syz.3.48" name="fib_trie" dev="proc" ino=4026532407 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 46.186158][ T28] audit: type=1400 audit(2000000005.910:180): avc: denied { attach_queue } for pid=601 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 46.218762][ T619] loop0: detected capacity change from 0 to 1024 [ 46.225418][ T619] EXT4-fs: Ignoring removed orlov option [ 46.259615][ T624] loop2: detected capacity change from 0 to 128 [ 46.280158][ T624] EXT4-fs: Ignoring removed nobh option [ 46.288136][ T613] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 46.297194][ T619] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 46.299858][ T624] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 46.335898][ T624] ext4 filesystem being mounted at /9/mnt supports timestamps until 2038 (0x7fffffff) [ 46.485722][ T28] audit: type=1400 audit(2000000006.320:181): avc: denied { write } for pid=620 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 46.656158][ T28] audit: type=1400 audit(2000000006.440:182): avc: denied { read } for pid=617 comm="syz.2.54" name="loop-control" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 46.703579][ T28] audit: type=1400 audit(2000000006.440:183): avc: denied { open } for pid=617 comm="syz.2.54" path="/dev/loop-control" dev="devtmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 47.226494][ T638] block device autoloading is deprecated and will be removed. [ 47.380498][ T297] EXT4-fs (loop2): unmounting filesystem. [ 47.501598][ T28] audit: type=1400 audit(2000000006.730:184): avc: denied { ioctl } for pid=617 comm="syz.2.54" path="/dev/loop-control" dev="devtmpfs" ino=113 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 47.586874][ T28] audit: type=1400 audit(2000000007.030:185): avc: denied { create } for pid=618 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 47.640687][ T300] EXT4-fs (loop4): unmounting filesystem. [ 47.753307][ T296] EXT4-fs (loop0): unmounting filesystem. [ 48.108972][ T661] loop1: detected capacity change from 0 to 512 [ 48.123546][ T661] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 49.169276][ T680] loop0: detected capacity change from 0 to 512 [ 49.329131][ T28] audit: type=1400 audit(2000000009.130:186): avc: denied { read } for pid=676 comm="syz.1.67" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 49.410045][ T680] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 49.428004][ T28] audit: type=1400 audit(2000000009.130:187): avc: denied { open } for pid=676 comm="syz.1.67" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 49.465810][ T680] ext4 filesystem being mounted at /14/file0 supports timestamps until 2038 (0x7fffffff) [ 49.480216][ T28] audit: type=1400 audit(2000000009.140:188): avc: denied { create } for pid=676 comm="syz.1.67" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 49.567932][ T28] audit: type=1400 audit(2000000009.150:189): avc: denied { write } for pid=676 comm="syz.1.67" name="file0" dev="tmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 49.637796][ T28] audit: type=1400 audit(2000000009.150:190): avc: denied { open } for pid=676 comm="syz.1.67" path="/15/file0" dev="tmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 50.265961][ T701] netlink: 8 bytes leftover after parsing attributes in process `syz.0.66'. [ 50.274803][ T700] netlink: 8 bytes leftover after parsing attributes in process `syz.0.66'. [ 50.564784][ T707] loop3: detected capacity change from 0 to 1024 [ 50.591516][ T28] audit: type=1400 audit(2000000009.150:191): avc: denied { ioctl } for pid=676 comm="syz.1.67" path="/15/file0" dev="tmpfs" ino=101 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 50.678459][ T686] Zero length message leads to an empty skb [ 50.688795][ T28] audit: type=1400 audit(2000000009.160:192): avc: denied { ioctl } for pid=676 comm="syz.1.67" path="/dev/binderfs/binder0" dev="binder" ino=10 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 50.714751][ T28] audit: type=1400 audit(2000000009.160:193): avc: denied { set_context_mgr } for pid=676 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 50.828750][ T707] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 51.678304][ T296] EXT4-fs (loop0): unmounting filesystem. [ 51.811351][ T688] loop4: detected capacity change from 0 to 40427 [ 51.823552][ T688] F2FS-fs (loop4): Unrecognized mount option "" or missing value [ 51.968455][ T726] loop1: detected capacity change from 0 to 512 [ 51.979846][ T726] EXT4-fs (loop1): Test dummy encryption mode enabled [ 51.994317][ T729] loop2: detected capacity change from 0 to 512 [ 52.003244][ T726] EXT4-fs error (device loop1): __ext4_iget:5057: inode #11: block 1: comm syz.1.75: invalid block [ 52.034833][ T726] EXT4-fs error (device loop1): ext4_orphan_get:1401: comm syz.1.75: couldn't read orphan inode 11 (err -117) [ 52.055004][ T731] loop0: detected capacity change from 0 to 2048 [ 52.064115][ T731] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 52.070811][ T298] EXT4-fs (loop3): unmounting filesystem. [ 52.078822][ T729] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 52.087575][ T729] ext4 filesystem being mounted at /12/file0 supports timestamps until 2038 (0x7fffffff) [ 52.092541][ T726] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 52.136494][ T731] loop0: detected capacity change from 0 to 4096 [ 52.143470][ T731] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 52.182511][ T726] fscrypt: AES-256-XTS using blk-crypto-fallback [ 52.197863][ T726] EXT4-fs error (device loop1): ext4_add_entry:2484: inode #2: comm syz.1.75: Directory hole found for htree leaf block 0 [ 52.215542][ T726] EXT4-fs error (device loop1): ext4_add_entry:2484: inode #2: comm syz.1.75: Directory hole found for htree leaf block 0 [ 53.214319][ T743] tty tty25: ldisc open failed (-12), clearing slot 24 [ 53.372755][ T297] EXT4-fs (loop2): unmounting filesystem. [ 53.405902][ T731] loop0: detected capacity change from 0 to 16 [ 53.444253][ T731] erofs: Unknown parameter 'system_u:object_r:hugetlbfs_t:s0' [ 53.455389][ T749] loop2: detected capacity change from 0 to 256 [ 53.483439][ T749] exFAT-fs (loop2): failed to load upcase table (idx : 0x000104d0, chksum : 0x60d18cac, utbl_chksum : 0xe619d30d) [ 53.528336][ T299] EXT4-fs (loop1): unmounting filesystem. [ 53.558474][ T755] loop0: detected capacity change from 0 to 1024 [ 53.588208][ T755] EXT4-fs: Ignoring removed orlov option [ 53.603078][ T755] EXT4-fs: Ignoring removed nomblk_io_submit option [ 54.771691][ T755] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 54.777586][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 54.777601][ T28] audit: type=1400 audit(2000000014.620:203): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 54.908958][ T751] loop3: detected capacity change from 0 to 40427 [ 54.931531][ T751] F2FS-fs (loop3): Invalid log_blocksize (268), supports only 12 [ 55.138630][ T777] process 'syz.4.84' launched '/dev/fd/3' with NULL argv: empty string added [ 55.863668][ T28] audit: type=1400 audit(2000000014.900:204): avc: denied { ioctl } for pid=765 comm="syz.4.84" path="socket:[16826]" dev="sockfs" ino=16826 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 55.904818][ T751] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 55.913692][ T28] audit: type=1400 audit(2000000015.000:205): avc: denied { execute } for pid=765 comm="syz.4.84" dev="tmpfs" ino=1089 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 55.934976][ T28] audit: type=1400 audit(2000000015.000:206): avc: denied { execute_no_trans } for pid=765 comm="syz.4.84" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1089 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 55.978948][ T28] audit: type=1400 audit(2000000015.710:207): avc: denied { accept } for pid=754 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 56.012053][ T784] loop1: detected capacity change from 0 to 512 [ 56.018886][ T784] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities [ 56.029155][ T28] audit: type=1400 audit(2000000015.710:208): avc: denied { mounton } for pid=754 comm="syz.0.83" path="/17/file1/file0" dev="loop0" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 56.058989][ T751] F2FS-fs (loop3): invalid crc value [ 56.161942][ T751] F2FS-fs (loop3): Found nat_bits in checkpoint [ 56.402112][ T791] netlink: 68 bytes leftover after parsing attributes in process `syz.1.86'. [ 56.443465][ T28] audit: type=1400 audit(2000000016.290:209): avc: denied { remove_name } for pid=296 comm="syz-executor" name="lost+found" dev="loop0" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 56.532903][ T296] EXT4-fs (loop0): unmounting filesystem. [ 56.595340][ T28] audit: type=1400 audit(2000000016.310:210): avc: denied { rmdir } for pid=296 comm="syz-executor" name="lost+found" dev="loop0" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 56.621514][ T28] audit: type=1400 audit(2000000016.330:211): avc: denied { rmdir } for pid=296 comm="syz-executor" name=".index" dev="loop0" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 56.651453][ T796] loop4: detected capacity change from 0 to 512 [ 56.664440][ T28] audit: type=1400 audit(2000000016.340:212): avc: denied { unlink } for pid=296 comm="syz-executor" name="file0" dev="loop0" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 56.699092][ T796] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 56.717936][ T796] ext4 filesystem being mounted at /17/file0 supports timestamps until 2038 (0x7fffffff) [ 57.532018][ T300] EXT4-fs (loop4): unmounting filesystem. [ 57.585145][ T812] syz.3.91[812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.585218][ T812] syz.3.91[812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.670597][ T817] loop3: detected capacity change from 0 to 512 [ 57.728137][ T817] ext4: Unknown parameter 'obj_type' [ 57.768737][ T819] binder: 814:819 ioctl c0306201 200001c0 returned -22 [ 57.801868][ T799] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.829394][ T799] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.018653][ T828] loop0: detected capacity change from 0 to 2048 [ 59.909562][ T102] loop0: unable to read partition table [ 59.921369][ T102] loop0: partition table beyond EOD, truncated [ 59.951055][ T836] loop0: detected capacity change from 0 to 512 [ 60.045377][ T839] loop1: detected capacity change from 0 to 512 [ 60.061963][ T839] EXT4-fs: Ignoring removed mblk_io_submit option [ 60.065971][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 60.065988][ T28] audit: type=1400 audit(2000000019.910:215): avc: denied { create } for pid=840 comm="syz.3.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 60.077815][ T839] EXT4-fs: Ignoring removed i_version option [ 60.105509][ T836] EXT4-fs error (device loop0): ext4_map_blocks:634: inode #2: block 3: comm syz.0.97: lblock 0 mapped to illegal pblock 3 (length 1) [ 60.148914][ T836] EXT4-fs (loop0): Remounting filesystem read-only [ 60.157592][ T836] EXT4-fs warning (device loop0): dx_probe:823: inode #2: lblock 0: comm syz.0.97: error -117 reading directory block [ 60.174200][ T836] EXT4-fs (loop0): Cannot turn on journaled quota: type 1: error -117 [ 60.182294][ T836] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 60.195201][ T839] EXT4-fs error (device loop1): __ext4_iget:5057: inode #11: block 1: comm syz.1.98: invalid block [ 60.205904][ T839] EXT4-fs (loop1): Remounting filesystem read-only [ 60.212520][ T839] EXT4-fs error (device loop1): ext4_orphan_get:1401: comm syz.1.98: couldn't read orphan inode 11 (err -117) [ 60.224528][ T839] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 60.539537][ T849] loop3: detected capacity change from 0 to 256 [ 60.701657][ T28] audit: type=1400 audit(2000000020.550:216): avc: denied { create } for pid=835 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 61.471768][ T28] audit: type=1400 audit(2000000020.550:217): avc: denied { setopt } for pid=835 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 61.500772][ T28] audit: type=1400 audit(2000000021.340:218): avc: denied { block_suspend } for pid=832 comm="syz.2.96" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 61.502011][ T296] EXT4-fs (loop0): unmounting filesystem. [ 61.547100][ T857] loop0: detected capacity change from 0 to 128 [ 62.639119][ T868] device wg2 entered promiscuous mode [ 63.500137][ T299] EXT4-fs (loop1): unmounting filesystem. [ 63.950965][ T885] loop0: detected capacity change from 0 to 512 [ 63.993243][ T885] EXT4-fs (loop0): couldn't mount as ext2 due to feature incompatibilities [ 64.109810][ T860] loop3: detected capacity change from 0 to 40427 [ 64.140429][ T860] F2FS-fs (loop3): Invalid log_blocksize (268), supports only 12 [ 64.157784][ T860] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 64.251872][ T891] netlink: 68 bytes leftover after parsing attributes in process `syz.0.107'. [ 64.510866][ T860] F2FS-fs (loop3): Found nat_bits in checkpoint [ 64.522855][ T881] loop1: detected capacity change from 0 to 40427 [ 64.543145][ T28] audit: type=1400 audit(2000000024.390:219): avc: denied { create } for pid=894 comm="syz.4.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 64.572941][ T881] F2FS-fs (loop1): Invalid log_blocksize (268), supports only 12 [ 64.587394][ T881] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 64.587567][ T28] audit: type=1400 audit(2000000024.410:220): avc: denied { read } for pid=894 comm="syz.4.108" path="socket:[17969]" dev="sockfs" ino=17969 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 64.621888][ T881] F2FS-fs (loop1): invalid crc value [ 64.642635][ T881] F2FS-fs (loop1): Found nat_bits in checkpoint [ 64.691971][ T881] F2FS-fs (loop1): Try to recover 1th superblock, ret: 0 [ 64.698988][ T881] F2FS-fs (loop1): Mounted with checkpoint version = 48b305e5 [ 64.912806][ T301] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 65.417808][ T301] usb 5-1: Using ep0 maxpacket: 32 [ 65.537815][ T301] usb 5-1: config 0 has an invalid interface number: 67 but max is 0 [ 65.545827][ T301] usb 5-1: config 0 has no interface number 0 [ 65.737844][ T301] usb 5-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 65.746794][ T301] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 65.757851][ T919] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 65.774371][ T919] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 65.816033][ T301] usb 5-1: Product: syz [ 65.820497][ T301] usb 5-1: Manufacturer: syz [ 65.824951][ T301] usb 5-1: SerialNumber: syz [ 65.834689][ T922] netlink: 28 bytes leftover after parsing attributes in process `syz.3.112'. [ 65.835317][ T301] usb 5-1: config 0 descriptor?? [ 65.877927][ T922] netlink: 8 bytes leftover after parsing attributes in process `syz.3.112'. [ 65.891001][ T301] smsc95xx v2.0.0 [ 65.894534][ T301] smsc95xx 5-1:0.67 (unnamed net_device) (uninitialized): usbnet_get_endpoints failed: -22 [ 65.915806][ T301] smsc95xx: probe of 5-1:0.67 failed with error -22 [ 65.968554][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 66.073126][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.140276][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 66.148301][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.156321][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.164526][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.172982][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.196361][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.212818][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth3: link becomes ready [ 66.230731][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth2: link becomes ready [ 66.342719][ T28] audit: type=1400 audit(2000000026.190:221): avc: denied { getopt } for pid=925 comm="syz.3.115" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 66.532791][ T301] usb 5-1: USB disconnect, device number 2 [ 66.933212][ T939] loop0: detected capacity change from 0 to 512 [ 66.959502][ T939] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 66.968758][ T939] ext4 filesystem being mounted at /24/file0 supports timestamps until 2038 (0x7fffffff) [ 67.067202][ T937] loop2: detected capacity change from 0 to 40427 [ 67.074026][ T937] F2FS-fs (loop2): Invalid log_blocksize (268), supports only 12 [ 67.081615][ T937] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 67.094053][ T937] F2FS-fs (loop2): invalid crc value [ 67.102801][ T937] F2FS-fs (loop2): Found nat_bits in checkpoint [ 67.450790][ T950] netlink: 'syz.0.117': attribute type 4 has an invalid length. [ 67.474928][ T950] netlink: 'syz.0.117': attribute type 4 has an invalid length. [ 67.614015][ T28] audit: type=1400 audit(2000000027.460:222): avc: denied { setopt } for pid=944 comm="syz.3.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 67.861512][ T28] audit: type=1400 audit(2000000027.460:223): avc: denied { bind } for pid=944 comm="syz.3.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 67.882569][ T28] audit: type=1400 audit(2000000027.460:224): avc: denied { ioctl } for pid=944 comm="syz.3.118" path="socket:[18026]" dev="sockfs" ino=18026 ioctlcmd=0x48d2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 67.898519][ T937] F2FS-fs (loop2): Try to recover 1th superblock, ret: 0 [ 67.914232][ T937] F2FS-fs (loop2): Mounted with checkpoint version = 48b305e5 [ 67.915803][ T296] EXT4-fs (loop0): unmounting filesystem. [ 67.951958][ T960] loop0: detected capacity change from 0 to 256 [ 67.960634][ T960] exFAT-fs (loop0): failed to load upcase table (idx : 0x000104d0, chksum : 0x60d18cac, utbl_chksum : 0xe619d30d) [ 68.105089][ T28] audit: type=1400 audit(2000000027.910:225): avc: denied { append } for pid=936 comm="syz.2.116" path="/21/bus/freezer.parent_freezing" dev="loop2" ino=455 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 70.220497][ T28] audit: type=1400 audit(2000000030.050:226): avc: denied { write } for pid=980 comm="syz.0.125" name="001" dev="devtmpfs" ino=160 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 70.239711][ T977] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=1, run fsck to fix. [ 70.694188][ T990] binder: 984:990 ioctl 4018620d 0 returned -22 [ 70.715606][ T977] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix. [ 70.739644][ T28] audit: type=1400 audit(2000000030.070:227): avc: denied { write } for pid=980 comm="syz.0.125" path="socket:[18074]" dev="sockfs" ino=18074 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 70.800923][ T28] audit: type=1400 audit(2000000030.070:228): avc: denied { nlmsg_write } for pid=980 comm="syz.0.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 70.821529][ T28] audit: type=1400 audit(2000000030.080:229): avc: denied { nlmsg_read } for pid=980 comm="syz.0.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 70.842079][ T28] audit: type=1400 audit(2000000030.560:230): avc: denied { connect } for pid=984 comm="syz.4.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 70.919466][ T993] loop3: detected capacity change from 0 to 512 [ 70.925782][ T993] EXT4-fs: Ignoring removed mblk_io_submit option [ 70.942281][ T999] loop1: detected capacity change from 0 to 512 [ 70.954294][ T993] EXT4-fs error (device loop3): ext4_find_inline_data_nolock:164: inode #12: comm syz.3.128: inline data xattr refers to an external xattr inode [ 70.969431][ T993] EXT4-fs error (device loop3): ext4_orphan_get:1401: comm syz.3.128: couldn't read orphan inode 12 (err -117) [ 70.981442][ T993] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 71.052643][ T999] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 71.061620][ T999] ext4 filesystem being mounted at /29/file0 supports timestamps until 2038 (0x7fffffff) [ 71.592885][ T28] audit: type=1400 audit(2000000031.130:231): avc: denied { create } for pid=996 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 71.678273][ T28] audit: type=1400 audit(2000000031.520:232): avc: denied { connect } for pid=1006 comm="syz.2.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 71.706385][ T1009] loop2: detected capacity change from 0 to 256 [ 71.713807][ T1009] exfat: Bad value for 'uid' [ 72.166250][ T1015] netlink: 8 bytes leftover after parsing attributes in process `syz.1.129'. [ 72.175542][ T1013] netlink: 8 bytes leftover after parsing attributes in process `syz.1.129'. [ 72.336670][ T298] EXT4-fs error (device loop3): htree_dirblock_to_tree:1083: inode #2: comm syz-executor: Directory hole found for htree leaf block 0 [ 72.527245][ T1019] loop2: detected capacity change from 0 to 512 [ 72.564546][ T1012] EXT4-fs (loop3): unmounting filesystem. [ 72.592966][ T1019] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 72.605188][ T1019] ext4 filesystem being mounted at /24/file0 supports timestamps until 2038 (0x7fffffff) [ 72.686089][ T299] EXT4-fs (loop1): unmounting filesystem. [ 72.719790][ T28] audit: type=1400 audit(2000000032.570:233): avc: denied { remove_name } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 72.745509][ T28] audit: type=1400 audit(2000000032.570:234): avc: denied { rename } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.769371][ T28] audit: type=1400 audit(2000000032.570:235): avc: denied { create } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.889156][ T1029] loop1: detected capacity change from 0 to 512 [ 73.039788][ T28] audit: type=1400 audit(2000000032.770:236): avc: denied { mounton } for pid=1018 comm="syz.2.133" path="/24/file0/bus" dev="loop2" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 73.084320][ T28] audit: type=1400 audit(2000000032.770:237): avc: denied { write } for pid=1018 comm="syz.2.133" name="bus" dev="loop2" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 73.105701][ T28] audit: type=1400 audit(2000000032.770:238): avc: denied { add_name } for pid=1018 comm="syz.2.133" name="work" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 73.114299][ T1029] EXT4-fs (loop1): 1 truncate cleaned up [ 73.128662][ T28] audit: type=1400 audit(2000000032.770:239): avc: denied { setattr } for pid=1018 comm="syz.2.133" name="work" dev="loop2" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 73.152857][ T1029] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 73.161473][ T28] audit: type=1400 audit(2000000032.780:240): avc: denied { remove_name } for pid=1018 comm="syz.2.133" name="#7" dev="loop2" ino=22 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 73.237313][ T1028] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.244361][ T1028] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.251812][ T1028] device bridge_slave_0 entered promiscuous mode [ 73.259052][ T1028] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.266073][ T1028] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.273309][ T1028] device bridge_slave_1 entered promiscuous mode [ 73.519699][ T1042] loop4: detected capacity change from 0 to 512 [ 73.555243][ T1041] loop0: detected capacity change from 0 to 1024 [ 73.606530][ T1042] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 73.621018][ T1042] EXT4-fs (loop4): 1 truncate cleaned up [ 73.626621][ T1042] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 73.825680][ T1041] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 73.908727][ T297] EXT4-fs (loop2): unmounting filesystem. [ 73.951007][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.959080][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.995232][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.006023][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.014167][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.021032][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.028545][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.998060][ T300] EXT4-fs (loop4): unmounting filesystem. [ 75.000061][ T768] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 75.012230][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.020826][ T296] EXT4-fs (loop0): unmounting filesystem. [ 75.022192][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.035259][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.042128][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.060324][ T1055] loop0: detected capacity change from 0 to 512 [ 75.067100][ T1055] EXT4-fs (loop0): couldn't mount as ext2 due to feature incompatibilities [ 75.145923][ T977] device bridge_slave_1 left promiscuous mode [ 75.154428][ T977] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.162397][ T977] device bridge_slave_0 left promiscuous mode [ 75.169220][ T977] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.177550][ T977] device veth1_macvtap left promiscuous mode [ 75.201999][ T977] device veth0_vlan left promiscuous mode [ 75.522447][ T768] usb 2-1: Using ep0 maxpacket: 32 [ 75.571462][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 75.581035][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.704058][ T1061] netlink: 68 bytes leftover after parsing attributes in process `syz.0.142'. [ 75.758360][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 75.826463][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 75.845931][ T299] EXT4-fs error (device loop1): htree_dirblock_to_tree:1112: inode #2: block 13: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=76, inode=196608, rec_len=0, size=1024 fake=0 [ 75.874180][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 75.882535][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.940508][ T299] EXT4-fs error (device loop1): ext4_ext_check_inode:520: inode #11: comm syz-executor: pblk 0 bad header/extent: invalid magic - magic e, entries 0, max 15(0), depth 0(0) [ 75.946840][ T1028] device veth0_vlan entered promiscuous mode [ 75.967801][ T768] usb 2-1: unable to read config index 0 descriptor/all [ 75.974613][ T768] usb 2-1: can't read configurations, error -71 [ 75.976466][ T1065] loop0: detected capacity change from 0 to 512 [ 75.986899][ T299] EXT4-fs error (device loop1): ext4_ext_check_inode:520: inode #11: comm syz-executor: pblk 0 bad header/extent: invalid magic - magic e, entries 0, max 15(0), depth 0(0) [ 76.009692][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 76.018685][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.027337][ T1065] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 76.041885][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.049450][ T1065] ext4 filesystem being mounted at /31/file0 supports timestamps until 2038 (0x7fffffff) [ 76.059500][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.078493][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 76.087066][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.096688][ T1028] device veth1_macvtap entered promiscuous mode [ 76.107482][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 76.115693][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 76.123842][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.145541][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 76.158857][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 76.186619][ T299] EXT4-fs (loop1): unmounting filesystem. [ 77.075860][ T1080] netlink: 8 bytes leftover after parsing attributes in process `syz.0.145'. [ 77.085404][ T1077] netlink: 8 bytes leftover after parsing attributes in process `syz.0.145'. [ 77.109146][ T28] kauditd_printk_skb: 83 callbacks suppressed [ 77.109161][ T28] audit: type=1326 audit(2000000036.960:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1062 comm="syz.2.144" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f84e377e31b code=0x7ffc0000 [ 77.173355][ T28] audit: type=1326 audit(2000000037.020:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1074 comm="syz.5.135" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f40d377e719 code=0x7ffc0000 [ 77.209872][ T28] audit: type=1326 audit(2000000037.020:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1074 comm="syz.5.135" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f40d377e719 code=0x7ffc0000 [ 77.233448][ T28] audit: type=1326 audit(2000000037.020:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1062 comm="syz.2.144" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f84e377e31b code=0x7ffc0000 [ 77.265530][ T28] audit: type=1326 audit(2000000037.080:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1062 comm="syz.2.144" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f84e377e31b code=0x7ffc0000 [ 77.317737][ T28] audit: type=1326 audit(2000000037.080:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1062 comm="syz.2.144" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f84e377e31b code=0x7ffc0000 [ 77.342317][ T296] EXT4-fs (loop0): unmounting filesystem. [ 77.427855][ T28] audit: type=1326 audit(2000000037.110:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1062 comm="syz.2.144" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f84e377e31b code=0x7ffc0000 [ 77.513970][ T28] audit: type=1326 audit(2000000037.110:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1062 comm="syz.2.144" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f84e377e31b code=0x7ffc0000 [ 77.587610][ T28] audit: type=1326 audit(2000000037.110:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1062 comm="syz.2.144" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f84e377e31b code=0x7ffc0000 [ 77.634293][ T28] audit: type=1326 audit(2000000037.170:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1062 comm="syz.2.144" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f84e377e31b code=0x7ffc0000 [ 77.794187][ T1090] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.818052][ T1090] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.825487][ T1090] device bridge_slave_0 entered promiscuous mode [ 77.878098][ T1090] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.884960][ T1090] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.919383][ T1090] device bridge_slave_1 entered promiscuous mode [ 77.968362][ T977] device bridge_slave_1 left promiscuous mode [ 77.974343][ T977] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.988419][ T977] device bridge_slave_0 left promiscuous mode [ 77.994365][ T977] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.335001][ T1104] sch_tbf: burst 65535 is lower than device lo mtu (65550) ! [ 78.596812][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.604604][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.714437][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.749985][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.786791][ T368] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.793784][ T368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.846485][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.888786][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.937336][ T368] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.944249][ T368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.992635][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.000722][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.009151][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.017046][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.028994][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.048807][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.057601][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.075140][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.083668][ T1090] device veth0_vlan entered promiscuous mode [ 79.105323][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.117434][ T1090] device veth1_macvtap entered promiscuous mode [ 79.132473][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 79.144377][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.169083][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 79.189678][ T368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 81.001546][ T15] sched: RT throttling activated [ 83.087239][ T1134] loop2: detected capacity change from 0 to 512 [ 83.109432][ T1134] EXT4-fs (loop2): couldn't mount as ext3 due to feature incompatibilities [ 83.135178][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 83.135192][ T28] audit: type=1400 audit(2000000042.980:341): avc: denied { append } for pid=1136 comm="syz.6.158" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 83.167651][ T28] audit: type=1400 audit(2000000043.010:342): avc: denied { bind } for pid=1136 comm="syz.6.158" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 83.225706][ T28] audit: type=1404 audit(2000000043.040:343): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 83.244340][ T28] audit: type=1400 audit(2000000043.070:344): avc: denied { read write } for pid=1133 comm="syz.2.156" name="loop2" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.268775][ T28] audit: type=1400 audit(2000000043.090:345): avc: denied { bpf } for pid=1133 comm="syz.2.156" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 83.359225][ T28] audit: type=1400 audit(2000000043.090:346): avc: denied { prog_load } for pid=1133 comm="syz.2.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 83.631264][ T28] audit: type=1400 audit(2000000043.120:347): avc: denied { execmem } for pid=1133 comm="syz.2.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 83.652811][ T28] audit: type=1400 audit(2000000043.120:348): avc: denied { bpf } for pid=1133 comm="syz.2.156" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 83.674612][ T28] audit: type=1400 audit(2000000043.120:349): avc: denied { bpf } for pid=1133 comm="syz.2.156" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 83.695710][ T28] audit: type=1400 audit(2000000043.120:350): avc: denied { prog_load } for pid=1133 comm="syz.2.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 83.919082][ T1167] device syzkaller0 entered promiscuous mode [ 85.522003][ T1229] mmap: syz.4.191 (1229) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 87.269102][ T1336] netlink: 4 bytes leftover after parsing attributes in process `syz.6.235'. [ 88.263501][ T28] kauditd_printk_skb: 1110 callbacks suppressed [ 88.263517][ T28] audit: type=1400 audit(2000000048.110:1461): avc: denied { read write } for pid=1028 comm="syz-executor" name="loop5" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 88.299397][ T28] audit: type=1400 audit(2000000048.120:1462): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 88.321329][ T28] audit: type=1400 audit(2000000048.140:1463): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 88.343459][ T28] audit: type=1400 audit(2000000048.170:1464): avc: denied { bpf } for pid=1380 comm="syz.5.252" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 88.367583][ T28] audit: type=1400 audit(2000000048.170:1465): avc: denied { prog_load } for pid=1380 comm="syz.5.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 88.386789][ T28] audit: type=1400 audit(2000000048.170:1466): avc: denied { execmem } for pid=1380 comm="syz.5.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 88.406256][ T28] audit: type=1400 audit(2000000048.170:1467): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 88.428354][ T28] audit: type=1400 audit(2000000048.190:1468): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 88.478966][ T28] audit: type=1400 audit(2000000048.210:1469): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 88.502620][ T28] audit: type=1400 audit(2000000048.230:1470): avc: denied { bpf } for pid=1380 comm="syz.5.252" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 90.374314][ T1464] xt_TPROXY: Can be used only with -p tcp or -p udp [ 90.600085][ T1476] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1547 sclass=netlink_route_socket pid=1476 comm=syz.0.291 [ 93.337762][ T28] kauditd_printk_skb: 918 callbacks suppressed [ 93.337780][ T28] audit: type=1400 audit(2000000053.180:2389): avc: denied { bpf } for pid=1582 comm="syz.2.332" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 93.381305][ T28] audit: type=1400 audit(2000000053.180:2390): avc: denied { prog_load } for pid=1582 comm="syz.2.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 93.414540][ T28] audit: type=1400 audit(2000000053.210:2391): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 93.453778][ T28] audit: type=1400 audit(2000000053.210:2392): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 93.484087][ T28] audit: type=1400 audit(2000000053.210:2393): avc: denied { bpf } for pid=1582 comm="syz.2.332" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 93.505962][ T28] audit: type=1400 audit(2000000053.210:2394): avc: denied { write } for pid=1582 comm="syz.2.332" name="001" dev="devtmpfs" ino=160 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 93.529245][ T28] audit: type=1400 audit(2000000053.210:2395): avc: denied { bpf } for pid=1582 comm="syz.2.332" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 93.550181][ T28] audit: type=1400 audit(2000000053.210:2396): avc: denied { prog_load } for pid=1582 comm="syz.2.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 93.569653][ T28] audit: type=1400 audit(2000000053.210:2397): avc: denied { bpf } for pid=1582 comm="syz.2.332" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 93.590601][ T28] audit: type=1400 audit(2000000053.210:2398): avc: denied { map_create } for pid=1582 comm="syz.2.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 94.186504][ T1619] netlink: 12 bytes leftover after parsing attributes in process `syz.0.345'. [ 94.199608][ T1619] netlink: 12 bytes leftover after parsing attributes in process `syz.0.345'. [ 95.296836][ T1645] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=1645 comm=syz.5.353 [ 96.648524][ T1701] futex_wake_op: syz.6.372 tries to shift op by 32; fix this program [ 98.369087][ T28] kauditd_printk_skb: 807 callbacks suppressed [ 98.369103][ T28] audit: type=1400 audit(2000000058.220:3206): avc: denied { read write } for pid=296 comm="syz-executor" name="loop0" dev="devtmpfs" ino=114 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.417732][ T28] audit: type=1400 audit(2000000058.250:3207): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 98.440198][ T28] audit: type=1400 audit(2000000058.250:3208): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 98.466288][ T28] audit: type=1400 audit(2000000058.250:3209): avc: denied { read write } for pid=300 comm="syz-executor" name="loop4" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.490824][ T28] audit: type=1400 audit(2000000058.250:3210): avc: denied { bpf } for pid=1741 comm="syz.0.385" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 98.511902][ T28] audit: type=1400 audit(2000000058.250:3211): avc: denied { map_create } for pid=1741 comm="syz.0.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.534910][ T28] audit: type=1400 audit(2000000058.250:3212): avc: denied { bpf } for pid=1741 comm="syz.0.385" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 98.555920][ T28] audit: type=1400 audit(2000000058.250:3213): avc: denied { prog_load } for pid=1741 comm="syz.0.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.575315][ T28] audit: type=1400 audit(2000000058.250:3214): avc: denied { bpf } for pid=1741 comm="syz.0.385" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 98.596351][ T28] audit: type=1400 audit(2000000058.250:3215): avc: denied { bpf } for pid=1741 comm="syz.0.385" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 100.221327][ T1791] netlink: 8 bytes leftover after parsing attributes in process `syz.2.402'. [ 100.312920][ T1779] syz.4.398 (1779) used greatest stack depth: 19080 bytes left [ 103.378055][ T28] kauditd_printk_skb: 825 callbacks suppressed [ 103.378071][ T28] audit: type=1400 audit(2000000063.230:4041): avc: denied { bpf } for pid=1883 comm="syz.6.435" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 103.432303][ T28] audit: type=1400 audit(2000000063.250:4042): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 103.454641][ T28] audit: type=1400 audit(2000000063.250:4043): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 103.477090][ T28] audit: type=1400 audit(2000000063.250:4044): avc: denied { prog_load } for pid=1883 comm="syz.6.435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.507767][ T28] audit: type=1400 audit(2000000063.250:4045): avc: denied { bpf } for pid=1883 comm="syz.6.435" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 103.528995][ T28] audit: type=1400 audit(2000000063.250:4046): avc: denied { create } for pid=1886 comm="syz.2.436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 103.550060][ T28] audit: type=1400 audit(2000000063.250:4047): avc: denied { create } for pid=1886 comm="syz.2.436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 103.570843][ T28] audit: type=1400 audit(2000000063.250:4048): avc: denied { bpf } for pid=1886 comm="syz.2.436" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 103.591812][ T28] audit: type=1400 audit(2000000063.250:4049): avc: denied { prog_load } for pid=1886 comm="syz.2.436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.618307][ T28] audit: type=1400 audit(2000000063.250:4050): avc: denied { bpf } for pid=1886 comm="syz.2.436" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 104.442240][ T1937] device syzkaller0 entered promiscuous mode [ 105.429700][ T1978] xt_policy: output policy not valid in PREROUTING and INPUT [ 106.437619][ T2045] can0: slcan on pts0. [ 106.509258][ T2045] can0 (unregistered): slcan off pts0. [ 107.152706][ T2079] device syzkaller0 entered promiscuous mode [ 108.387848][ T28] kauditd_printk_skb: 5699 callbacks suppressed [ 108.387864][ T28] audit: type=1400 audit(2000000068.240:9750): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 108.432914][ T28] audit: type=1400 audit(2000000068.260:9751): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 108.456621][ T28] audit: type=1400 audit(2000000068.260:9752): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 108.457555][ T2138] audit: audit_backlog=65 > audit_backlog_limit=64 [ 108.478604][ T28] audit: type=1400 audit(2000000068.260:9753): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 108.507361][ T28] audit: type=1400 audit(2000000068.260:9754): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 108.529202][ T28] audit: type=1400 audit(2000000068.260:9755): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 108.547722][ T2138] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 108.551094][ T28] audit: type=1400 audit(2000000068.260:9756): avc: denied { bpf } for pid=2133 comm="syz.2.531" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 108.567732][ T2138] audit: backlog limit exceeded [ 108.736319][ T2144] device syzkaller0 entered promiscuous mode [ 108.942851][ T2164] kernel profiling enabled (shift: 17) [ 109.215031][ T2185] device syzkaller0 entered promiscuous mode [ 110.612076][ T2234] device syzkaller0 entered promiscuous mode [ 111.634724][ T2315] xt_limit: Overflow, try lower: 0/0 [ 113.398660][ T28] kauditd_printk_skb: 16491 callbacks suppressed [ 113.398675][ T28] audit: type=1400 audit(2000000073.240:26230): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 113.448511][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.459400][ T84] audit: audit_lost=8 audit_rate_limit=0 audit_backlog_limit=64 [ 113.467324][ T28] audit: type=1400 audit(2000000073.270:26231): avc: denied { create } for pid=2371 comm="syz.4.629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 113.471258][ T84] audit: backlog limit exceeded [ 113.503394][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.514228][ T84] audit: audit_lost=9 audit_rate_limit=0 audit_backlog_limit=64 [ 113.523548][ T28] audit: type=1400 audit(2000000073.270:26232): avc: denied { create } for pid=2371 comm="syz.4.629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 113.527227][ T84] audit: backlog limit exceeded [ 113.562450][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.407730][ T28] kauditd_printk_skb: 24615 callbacks suppressed [ 118.407746][ T28] audit: type=1400 audit(2000000078.250:50817): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.434801][ T28] audit: type=1400 audit(2000000078.250:50816): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 118.458741][ T28] audit: type=1400 audit(2000000078.310:50818): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 118.480642][ T28] audit: type=1400 audit(2000000078.310:50819): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 118.502353][ T28] audit: type=1400 audit(2000000078.310:50820): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.523245][ T28] audit: type=1400 audit(2000000078.310:50821): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.544289][ T28] audit: type=1400 audit(2000000078.350:50822): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.565312][ T28] audit: type=1400 audit(2000000078.350:50823): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 118.587235][ T28] audit: type=1400 audit(2000000078.430:50824): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 118.609339][ T28] audit: type=1400 audit(2000000078.460:50825): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 123.418639][ T28] kauditd_printk_skb: 29357 callbacks suppressed [ 123.418655][ T28] audit: type=1400 audit(2000000083.270:80183): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 123.418681][ T28] audit: type=1400 audit(2000000083.270:80184): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.467788][ T28] audit: type=1400 audit(2000000083.310:80186): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.488686][ T28] audit: type=1400 audit(2000000083.310:80185): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 123.510971][ T28] audit: type=1400 audit(2000000083.360:80187): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 123.533088][ T28] audit: type=1400 audit(2000000083.380:80188): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.533119][ T28] audit: type=1400 audit(2000000083.380:80189): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 123.575904][ T28] audit: type=1400 audit(2000000083.420:80190): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 123.598085][ T28] audit: type=1400 audit(2000000083.450:80192): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.598117][ T28] audit: type=1400 audit(2000000083.450:80191): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 128.428861][ T28] kauditd_printk_skb: 29499 callbacks suppressed [ 128.428877][ T28] audit: type=1400 audit(2000000088.280:109692): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 128.428917][ T28] audit: type=1400 audit(2000000088.280:109693): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 128.478099][ T28] audit: type=1400 audit(2000000088.330:109694): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 128.499926][ T28] audit: type=1400 audit(2000000088.330:109695): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 128.521068][ T28] audit: type=1400 audit(2000000088.370:109696): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 128.543209][ T28] audit: type=1400 audit(2000000088.390:109697): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 128.565050][ T28] audit: type=1400 audit(2000000088.390:109698): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 128.586194][ T28] audit: type=1400 audit(2000000088.430:109699): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 128.609126][ T28] audit: type=1400 audit(2000000088.460:109700): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 128.630969][ T28] audit: type=1400 audit(2000000088.460:109701): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.437812][ T28] kauditd_printk_skb: 30313 callbacks suppressed [ 133.437829][ T28] audit: type=1400 audit(2000000093.290:140015): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.465123][ T28] audit: type=1400 audit(2000000093.290:140016): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 133.487606][ T28] audit: type=1400 audit(2000000093.340:140017): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.508668][ T28] audit: type=1400 audit(2000000093.340:140018): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 133.530799][ T28] audit: type=1400 audit(2000000093.380:140019): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 133.552993][ T28] audit: type=1400 audit(2000000093.400:140020): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 133.553022][ T28] audit: type=1400 audit(2000000093.400:140021): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.596558][ T28] audit: type=1400 audit(2000000093.440:140022): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 133.618674][ T28] audit: type=1400 audit(2000000093.470:140023): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 133.640477][ T28] audit: type=1400 audit(2000000093.470:140024): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 138.447824][ T28] kauditd_printk_skb: 30481 callbacks suppressed [ 138.447840][ T28] audit: type=1400 audit(2000000098.300:170506): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 138.474969][ T28] audit: type=1400 audit(2000000098.300:170507): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 138.497345][ T28] audit: type=1400 audit(2000000098.340:170509): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 138.518297][ T28] audit: type=1400 audit(2000000098.340:170508): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 138.540296][ T28] audit: type=1400 audit(2000000098.390:170510): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 138.562539][ T28] audit: type=1400 audit(2000000098.410:170511): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 138.584358][ T28] audit: type=1400 audit(2000000098.410:170512): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 138.605653][ T28] audit: type=1400 audit(2000000098.450:170513): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 138.627851][ T28] audit: type=1400 audit(2000000098.480:170514): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 138.648790][ T28] audit: type=1400 audit(2000000098.480:170515): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 143.457729][ T28] kauditd_printk_skb: 29801 callbacks suppressed [ 143.457744][ T28] audit: type=1400 audit(2000000103.310:200317): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 143.484867][ T28] audit: type=1400 audit(2000000103.310:200318): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 143.507110][ T28] audit: type=1400 audit(2000000103.350:200319): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 143.528953][ T28] audit: type=1400 audit(2000000103.350:200320): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 143.550096][ T28] audit: type=1400 audit(2000000103.400:200321): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 143.572393][ T28] audit: type=1400 audit(2000000103.420:200322): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 143.594345][ T28] audit: type=1400 audit(2000000103.420:200323): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 143.615570][ T28] audit: type=1400 audit(2000000103.460:200324): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 143.637823][ T28] audit: type=1400 audit(2000000103.490:200325): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 143.658772][ T28] audit: type=1400 audit(2000000103.490:200326): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 148.468963][ T28] kauditd_printk_skb: 29209 callbacks suppressed [ 148.468978][ T28] audit: type=1400 audit(2000000108.320:229536): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 148.469003][ T28] audit: type=1400 audit(2000000108.320:229537): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 148.518407][ T28] audit: type=1400 audit(2000000108.370:229538): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 148.540226][ T28] audit: type=1400 audit(2000000108.370:229539): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 148.561384][ T28] audit: type=1400 audit(2000000108.410:229540): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 148.583594][ T28] audit: type=1400 audit(2000000108.430:229542): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 148.604566][ T28] audit: type=1400 audit(2000000108.430:229541): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 148.626817][ T28] audit: type=1400 audit(2000000108.470:229543): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 148.650638][ T28] audit: type=1400 audit(2000000108.500:229544): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 148.650667][ T28] audit: type=1400 audit(2000000108.500:229545): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 153.478684][ T28] kauditd_printk_skb: 29703 callbacks suppressed [ 153.478700][ T28] audit: type=1400 audit(2000000113.330:259249): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 153.506788][ T28] audit: type=1400 audit(2000000113.330:259250): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 153.528228][ T28] audit: type=1400 audit(2000000113.380:259252): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 153.549342][ T28] audit: type=1400 audit(2000000113.380:259251): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 153.571403][ T28] audit: type=1400 audit(2000000113.420:259253): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 153.593712][ T28] audit: type=1400 audit(2000000113.440:259254): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 153.614809][ T28] audit: type=1400 audit(2000000113.440:259255): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 153.636871][ T28] audit: type=1400 audit(2000000113.480:259256): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 153.659026][ T28] audit: type=1400 audit(2000000113.510:259257): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 153.680867][ T28] audit: type=1400 audit(2000000113.510:259258): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 158.487771][ T28] kauditd_printk_skb: 29513 callbacks suppressed [ 158.487787][ T28] audit: type=1400 audit(2000000118.340:288772): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 158.514936][ T28] audit: type=1400 audit(2000000118.340:288773): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 158.538004][ T28] audit: type=1400 audit(2000000118.390:288774): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 158.559843][ T28] audit: type=1400 audit(2000000118.390:288775): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 158.581003][ T28] audit: type=1400 audit(2000000118.430:288776): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 158.603186][ T28] audit: type=1400 audit(2000000118.450:288778): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 158.624187][ T28] audit: type=1400 audit(2000000118.450:288777): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 158.646369][ T28] audit: type=1400 audit(2000000118.490:288779): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 158.668597][ T28] audit: type=1400 audit(2000000118.520:288780): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 158.690441][ T28] audit: type=1400 audit(2000000118.520:288781): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 163.498616][ T28] kauditd_printk_skb: 29983 callbacks suppressed [ 163.498632][ T28] audit: type=1400 audit(2000000123.350:318765): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 163.525800][ T28] audit: type=1400 audit(2000000123.350:318766): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 163.548674][ T28] audit: type=1400 audit(2000000123.400:318767): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 163.570530][ T28] audit: type=1400 audit(2000000123.400:318768): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 163.591740][ T28] audit: type=1400 audit(2000000123.440:318769): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 163.613924][ T28] audit: type=1400 audit(2000000123.460:318770): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 163.635767][ T28] audit: type=1400 audit(2000000123.460:318771): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 163.656952][ T28] audit: type=1400 audit(2000000123.500:318772): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 163.679122][ T28] audit: type=1400 audit(2000000123.530:318773): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 163.700956][ T28] audit: type=1400 audit(2000000123.530:318774): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 168.508619][ T28] kauditd_printk_skb: 29727 callbacks suppressed [ 168.508635][ T28] audit: type=1400 audit(2000000128.360:348502): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 168.535813][ T28] audit: type=1400 audit(2000000128.360:348503): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 168.559032][ T28] audit: type=1400 audit(2000000128.410:348504): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 168.580959][ T28] audit: type=1400 audit(2000000128.410:348505): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 168.602076][ T28] audit: type=1400 audit(2000000128.450:348506): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 168.624296][ T28] audit: type=1400 audit(2000000128.470:348507): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 168.646158][ T28] audit: type=1400 audit(2000000128.470:348508): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 168.667491][ T28] audit: type=1400 audit(2000000128.520:348509): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 168.689636][ T28] audit: type=1400 audit(2000000128.540:348511): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 168.710600][ T28] audit: type=1400 audit(2000000128.540:348510): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 173.518765][ T28] kauditd_printk_skb: 29905 callbacks suppressed [ 173.518782][ T28] audit: type=1400 audit(2000000133.370:378417): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 173.518810][ T28] audit: type=1400 audit(2000000133.370:378418): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 173.568100][ T28] audit: type=1400 audit(2000000133.420:378419): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 173.590168][ T28] audit: type=1400 audit(2000000133.420:378420): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 173.611140][ T28] audit: type=1400 audit(2000000133.440:378421): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 173.633243][ T28] audit: type=1400 audit(2000000133.480:378422): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 173.655159][ T28] audit: type=1400 audit(2000000133.480:378423): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 173.676443][ T28] audit: type=1400 audit(2000000133.520:378424): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 173.698647][ T28] audit: type=1400 audit(2000000133.550:378425): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 173.720479][ T28] audit: type=1400 audit(2000000133.550:378426): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 178.528177][ T28] kauditd_printk_skb: 29907 callbacks suppressed [ 178.528192][ T28] audit: type=1400 audit(2000000138.380:408335): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 178.528217][ T28] audit: type=1400 audit(2000000138.380:408334): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 178.577495][ T28] audit: type=1400 audit(2000000138.420:408336): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 178.599323][ T28] audit: type=1400 audit(2000000138.420:408337): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 178.620942][ T28] audit: type=1400 audit(2000000138.470:408338): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 178.643059][ T28] audit: type=1400 audit(2000000138.490:408339): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 178.665004][ T28] audit: type=1400 audit(2000000138.490:408340): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 178.686133][ T28] audit: type=1400 audit(2000000138.530:408341): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 178.708382][ T28] audit: type=1400 audit(2000000138.560:408342): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 178.730212][ T28] audit: type=1400 audit(2000000138.560:408343): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 183.538555][ T28] kauditd_printk_skb: 29971 callbacks suppressed [ 183.538571][ T28] audit: type=1400 audit(2000000143.390:438315): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 183.538597][ T28] audit: type=1400 audit(2000000143.390:438316): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 183.588793][ T28] audit: type=1400 audit(2000000143.440:438317): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 183.611411][ T28] audit: type=1400 audit(2000000143.460:438318): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 183.633235][ T28] audit: type=1400 audit(2000000143.460:438319): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 183.654659][ T28] audit: type=1400 audit(2000000143.500:438320): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 183.676748][ T28] audit: type=1400 audit(2000000143.520:438321): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 183.698578][ T28] audit: type=1400 audit(2000000143.520:438322): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 183.719699][ T28] audit: type=1400 audit(2000000143.570:438323): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 183.741909][ T28] audit: type=1400 audit(2000000143.590:438324): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.547757][ T28] kauditd_printk_skb: 29747 callbacks suppressed [ 188.547773][ T28] audit: type=1400 audit(2000000148.400:468072): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 188.575014][ T28] audit: type=1400 audit(2000000148.400:468073): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.607703][ T28] audit: type=1400 audit(2000000148.450:468074): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.629522][ T28] audit: type=1400 audit(2000000148.450:468075): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 188.650565][ T28] audit: type=1400 audit(2000000148.450:468076): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.650601][ T28] audit: type=1400 audit(2000000148.450:468077): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.650626][ T28] audit: type=1400 audit(2000000148.450:468078): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 188.715139][ T28] audit: type=1400 audit(2000000148.450:468079): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.736913][ T28] audit: type=1400 audit(2000000148.450:468080): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 188.758706][ T28] audit: type=1400 audit(2000000148.450:468081): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 193.558964][ T28] kauditd_printk_skb: 30083 callbacks suppressed [ 193.558980][ T28] audit: type=1400 audit(2000000153.410:498165): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 193.559008][ T28] audit: type=1400 audit(2000000153.410:498166): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 193.608458][ T28] audit: type=1400 audit(2000000153.460:498167): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 193.630289][ T28] audit: type=1400 audit(2000000153.460:498168): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 193.651448][ T28] audit: type=1400 audit(2000000153.500:498169): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 193.673606][ T28] audit: type=1400 audit(2000000153.520:498171): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 193.694657][ T28] audit: type=1400 audit(2000000153.520:498170): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 193.716690][ T28] audit: type=1400 audit(2000000153.560:498172): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 193.738822][ T28] audit: type=1400 audit(2000000153.590:498173): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 193.760642][ T28] audit: type=1400 audit(2000000153.590:498174): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 198.568336][ T28] kauditd_printk_skb: 30317 callbacks suppressed [ 198.568353][ T28] audit: type=1400 audit(2000000158.420:528492): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 198.596572][ T28] audit: type=1400 audit(2000000158.420:528493): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 198.618958][ T28] audit: type=1400 audit(2000000158.470:528494): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 198.640816][ T28] audit: type=1400 audit(2000000158.470:528495): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 198.640845][ T28] audit: type=1400 audit(2000000158.470:528496): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 198.684541][ T28] audit: type=1400 audit(2000000158.470:528497): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 198.706335][ T28] audit: type=1400 audit(2000000158.470:528498): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 198.727562][ T28] audit: type=1400 audit(2000000158.570:528499): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 198.727588][ T28] audit: type=1400 audit(2000000158.570:528500): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 198.770617][ T28] audit: type=1400 audit(2000000158.620:528501): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 203.578747][ T28] kauditd_printk_skb: 29519 callbacks suppressed [ 203.578764][ T28] audit: type=1400 audit(2000000163.430:558021): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 203.578792][ T28] audit: type=1400 audit(2000000163.430:558022): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 203.627984][ T28] audit: type=1400 audit(2000000163.480:558023): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 203.649830][ T28] audit: type=1400 audit(2000000163.480:558024): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 203.671098][ T28] audit: type=1400 audit(2000000163.520:558025): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 203.693218][ T28] audit: type=1400 audit(2000000163.540:558026): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 203.715170][ T28] audit: type=1400 audit(2000000163.540:558027): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 203.736477][ T28] audit: type=1400 audit(2000000163.580:558028): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 203.758670][ T28] audit: type=1400 audit(2000000163.610:558030): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 203.780502][ T28] audit: type=1400 audit(2000000163.610:558029): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 208.587955][ T28] kauditd_printk_skb: 30043 callbacks suppressed [ 208.587971][ T28] audit: type=1400 audit(2000000168.440:588075): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 208.615849][ T28] audit: type=1400 audit(2000000168.440:588074): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 208.638070][ T28] audit: type=1400 audit(2000000168.490:588076): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 208.659897][ T28] audit: type=1400 audit(2000000168.490:588077): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 208.681025][ T28] audit: type=1400 audit(2000000168.530:588078): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 208.703270][ T28] audit: type=1400 audit(2000000168.550:588080): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 208.724236][ T28] audit: type=1400 audit(2000000168.550:588079): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 208.746265][ T28] audit: type=1400 audit(2000000168.590:588081): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 208.768495][ T28] audit: type=1400 audit(2000000168.620:588082): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 208.790323][ T28] audit: type=1400 audit(2000000168.620:588083): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 213.598543][ T28] kauditd_printk_skb: 30335 callbacks suppressed [ 213.598559][ T28] audit: type=1400 audit(2000000173.450:618420): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 213.625723][ T28] audit: type=1400 audit(2000000173.450:618419): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 213.648802][ T28] audit: type=1400 audit(2000000173.500:618421): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 213.670625][ T28] audit: type=1400 audit(2000000173.500:618422): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 213.691829][ T28] audit: type=1400 audit(2000000173.540:618423): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 213.714022][ T28] audit: type=1400 audit(2000000173.560:618424): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 213.736331][ T28] audit: type=1400 audit(2000000173.560:618425): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 213.757290][ T28] audit: type=1400 audit(2000000173.590:618426): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 213.779416][ T28] audit: type=1400 audit(2000000173.630:618427): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 213.801257][ T28] audit: type=1400 audit(2000000173.630:618428): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.608594][ T28] kauditd_printk_skb: 30277 callbacks suppressed [ 218.608609][ T28] audit: type=1400 audit(2000000178.460:648706): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 218.608637][ T28] audit: type=1400 audit(2000000178.460:648707): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.658778][ T28] audit: type=1400 audit(2000000178.510:648708): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 218.680612][ T28] audit: type=1400 audit(2000000178.510:648709): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.701794][ T28] audit: type=1400 audit(2000000178.550:648710): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 218.724199][ T28] audit: type=1400 audit(2000000178.570:648711): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 218.746030][ T28] audit: type=1400 audit(2000000178.570:648712): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.767235][ T28] audit: type=1400 audit(2000000178.610:648713): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 218.789479][ T28] audit: type=1400 audit(2000000178.640:648714): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 218.811310][ T28] audit: type=1400 audit(2000000178.640:648715): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 223.617731][ T28] kauditd_printk_skb: 30175 callbacks suppressed [ 223.617747][ T28] audit: type=1400 audit(2000000183.470:678891): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 223.617803][ T28] audit: type=1400 audit(2000000183.470:678892): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 223.667168][ T28] audit: type=1400 audit(2000000183.510:678893): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 223.689110][ T28] audit: type=1400 audit(2000000183.510:678894): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 223.710266][ T28] audit: type=1400 audit(2000000183.560:678895): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 223.732410][ T28] audit: type=1400 audit(2000000183.580:678896): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 223.732440][ T28] audit: type=1400 audit(2000000183.580:678897): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 223.775482][ T28] audit: type=1400 audit(2000000183.620:678898): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 223.797794][ T28] audit: type=1400 audit(2000000183.650:678899): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 223.818746][ T28] audit: type=1400 audit(2000000183.650:678900): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 228.627858][ T28] kauditd_printk_skb: 29759 callbacks suppressed [ 228.627873][ T28] audit: type=1400 audit(2000000188.480:708660): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 228.627899][ T28] audit: type=1400 audit(2000000188.480:708661): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 228.677206][ T28] audit: type=1400 audit(2000000188.520:708663): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 228.698223][ T28] audit: type=1400 audit(2000000188.520:708662): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 228.720475][ T28] audit: type=1400 audit(2000000188.570:708664): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 228.742597][ T28] audit: type=1400 audit(2000000188.590:708665): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 228.764578][ T28] audit: type=1400 audit(2000000188.590:708666): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 228.785787][ T28] audit: type=1400 audit(2000000188.630:708667): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 228.808034][ T28] audit: type=1400 audit(2000000188.660:708668): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 228.829848][ T28] audit: type=1400 audit(2000000188.660:708669): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 233.637863][ T28] kauditd_printk_skb: 29893 callbacks suppressed [ 233.637879][ T28] audit: type=1400 audit(2000000193.490:738564): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 233.665104][ T28] audit: type=1400 audit(2000000193.490:738563): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 233.687215][ T28] audit: type=1400 audit(2000000193.530:738565): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 233.709061][ T28] audit: type=1400 audit(2000000193.530:738566): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 233.730200][ T28] audit: type=1400 audit(2000000193.580:738567): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 233.752344][ T28] audit: type=1400 audit(2000000193.600:738568): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 233.774176][ T28] audit: type=1400 audit(2000000193.600:738569): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 233.795302][ T28] audit: type=1400 audit(2000000193.640:738570): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 233.817454][ T28] audit: type=1400 audit(2000000193.660:738571): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 233.839371][ T28] audit: type=1400 audit(2000000193.660:738572): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 238.647794][ T28] kauditd_printk_skb: 29327 callbacks suppressed [ 238.647810][ T28] audit: type=1400 audit(2000000198.500:767900): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 238.647838][ T28] audit: type=1400 audit(2000000198.500:767901): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 238.697048][ T28] audit: type=1400 audit(2000000198.540:767902): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 238.718899][ T28] audit: type=1400 audit(2000000198.540:767903): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 238.740037][ T28] audit: type=1400 audit(2000000198.590:767904): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 238.762215][ T28] audit: type=1400 audit(2000000198.610:767905): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 238.762245][ T28] audit: type=1400 audit(2000000198.610:767906): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 238.805170][ T28] audit: type=1400 audit(2000000198.650:767907): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 238.827279][ T28] audit: type=1400 audit(2000000198.670:767908): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 238.849110][ T28] audit: type=1400 audit(2000000198.670:767909): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 243.658612][ T28] kauditd_printk_skb: 30423 callbacks suppressed [ 243.658627][ T28] audit: type=1400 audit(2000000203.510:798333): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 243.686677][ T28] audit: type=1400 audit(2000000203.510:798334): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 243.708969][ T28] audit: type=1400 audit(2000000203.560:798335): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 243.730795][ T28] audit: type=1400 audit(2000000203.560:798336): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 243.751925][ T28] audit: type=1400 audit(2000000203.600:798337): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 243.774086][ T28] audit: type=1400 audit(2000000203.620:798338): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 243.795916][ T28] audit: type=1400 audit(2000000203.620:798339): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 243.817520][ T28] audit: type=1400 audit(2000000203.660:798340): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 243.839763][ T28] audit: type=1400 audit(2000000203.690:798341): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 243.861587][ T28] audit: type=1400 audit(2000000203.690:798342): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 248.668775][ T28] kauditd_printk_skb: 29975 callbacks suppressed [ 248.668791][ T28] audit: type=1400 audit(2000000208.520:828318): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 248.668816][ T28] audit: type=1400 audit(2000000208.520:828319): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 248.718038][ T28] audit: type=1400 audit(2000000208.570:828320): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 248.739860][ T28] audit: type=1400 audit(2000000208.570:828321): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 248.761003][ T28] audit: type=1400 audit(2000000208.610:828322): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 248.783155][ T28] audit: type=1400 audit(2000000208.630:828323): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 248.783185][ T28] audit: type=1400 audit(2000000208.630:828324): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 248.826122][ T28] audit: type=1400 audit(2000000208.670:828325): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 248.848444][ T28] audit: type=1400 audit(2000000208.700:828326): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 248.848474][ T28] audit: type=1400 audit(2000000208.700:828327): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 253.677626][ T28] kauditd_printk_skb: 29828 callbacks suppressed [ 253.677642][ T28] audit: type=1400 audit(2000000213.520:858156): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 253.706052][ T28] audit: type=1400 audit(2000000213.550:858157): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 253.727874][ T28] audit: type=1400 audit(2000000213.550:858158): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 253.751163][ T28] audit: type=1400 audit(2000000213.600:858159): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 253.773296][ T28] audit: type=1400 audit(2000000213.620:858160): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 253.795105][ T28] audit: type=1400 audit(2000000213.620:858161): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 253.816589][ T28] audit: type=1400 audit(2000000213.660:858162): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 253.838861][ T28] audit: type=1400 audit(2000000213.690:858163): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 253.860668][ T28] audit: type=1400 audit(2000000213.690:858164): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 253.881879][ T28] audit: type=1400 audit(2000000213.730:858165): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 258.687856][ T28] kauditd_printk_skb: 29940 callbacks suppressed [ 258.687870][ T28] audit: type=1400 audit(2000000218.540:888106): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 258.714996][ T28] audit: type=1400 audit(2000000218.540:888107): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 258.737232][ T28] audit: type=1400 audit(2000000218.580:888108): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 258.759071][ T28] audit: type=1400 audit(2000000218.580:888109): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 258.780252][ T28] audit: type=1400 audit(2000000218.630:888110): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 258.802378][ T28] audit: type=1400 audit(2000000218.650:888111): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 258.824216][ T28] audit: type=1400 audit(2000000218.650:888112): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 258.845393][ T28] audit: type=1400 audit(2000000218.690:888113): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 258.867666][ T28] audit: type=1400 audit(2000000218.710:888114): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 258.889507][ T28] audit: type=1400 audit(2000000218.710:888115): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 263.698594][ T28] kauditd_printk_skb: 29939 callbacks suppressed [ 263.698611][ T28] audit: type=1400 audit(2000000223.550:918055): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 263.698659][ T28] audit: type=1400 audit(2000000223.550:918056): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 263.748038][ T28] audit: type=1400 audit(2000000223.600:918057): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 263.748071][ T28] audit: type=1400 audit(2000000223.600:918058): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 263.791049][ T28] audit: type=1400 audit(2000000223.640:918059): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 263.813348][ T28] audit: type=1400 audit(2000000223.660:918060): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 263.835331][ T28] audit: type=1400 audit(2000000223.660:918061): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 263.856507][ T28] audit: type=1400 audit(2000000223.700:918062): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 263.878694][ T28] audit: type=1400 audit(2000000223.730:918064): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 263.899769][ T28] audit: type=1400 audit(2000000223.730:918063): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 268.707871][ T28] kauditd_printk_skb: 29947 callbacks suppressed [ 268.707887][ T28] audit: type=1400 audit(2000000228.560:948012): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 268.707915][ T28] audit: type=1400 audit(2000000228.560:948013): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 268.757225][ T28] audit: type=1400 audit(2000000228.600:948014): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 268.779077][ T28] audit: type=1400 audit(2000000228.600:948015): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 268.800883][ T28] audit: type=1400 audit(2000000228.650:948016): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 268.823047][ T28] audit: type=1400 audit(2000000228.670:948018): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 268.844016][ T28] audit: type=1400 audit(2000000228.670:948017): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 268.866134][ T28] audit: type=1400 audit(2000000228.710:948019): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 268.888496][ T28] audit: type=1400 audit(2000000228.740:948020): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 268.910350][ T28] audit: type=1400 audit(2000000228.740:948021): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 273.717701][ T28] kauditd_printk_skb: 29917 callbacks suppressed [ 273.717716][ T28] audit: type=1400 audit(2000000233.570:977939): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 273.744860][ T28] audit: type=1400 audit(2000000233.570:977940): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 273.767936][ T28] audit: type=1400 audit(2000000233.620:977941): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 273.789755][ T28] audit: type=1400 audit(2000000233.620:977942): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 273.810951][ T28] audit: type=1400 audit(2000000233.660:977943): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 273.833240][ T28] audit: type=1400 audit(2000000233.680:977945): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 273.854210][ T28] audit: type=1400 audit(2000000233.680:977944): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 273.876269][ T28] audit: type=1400 audit(2000000233.720:977946): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 273.898505][ T28] audit: type=1400 audit(2000000233.750:977948): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 273.898536][ T28] audit: type=1400 audit(2000000233.750:977947): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 278.727642][ T28] kauditd_printk_skb: 30097 callbacks suppressed [ 278.727657][ T28] audit: type=1400 audit(2000000238.570:1008047): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 278.754950][ T28] audit: type=1400 audit(2000000238.570:1008046): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 278.777133][ T28] audit: type=1400 audit(2000000238.620:1008048): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 278.777162][ T28] audit: type=1400 audit(2000000238.620:1008049): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 278.820364][ T28] audit: type=1400 audit(2000000238.670:1008050): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 278.842605][ T28] audit: type=1400 audit(2000000238.690:1008052): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 278.863774][ T28] audit: type=1400 audit(2000000238.690:1008051): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 278.885956][ T28] audit: type=1400 audit(2000000238.730:1008053): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 278.908261][ T28] audit: type=1400 audit(2000000238.760:1008054): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 278.930194][ T28] audit: type=1400 audit(2000000238.760:1008055): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 283.737893][ T28] kauditd_printk_skb: 29855 callbacks suppressed [ 283.737910][ T28] audit: type=1400 audit(2000000243.590:1037911): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 283.737937][ T28] audit: type=1400 audit(2000000243.590:1037912): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 283.787529][ T28] audit: type=1400 audit(2000000243.630:1037913): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 283.808699][ T28] audit: type=1400 audit(2000000243.630:1037914): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 283.830879][ T28] audit: type=1400 audit(2000000243.680:1037915): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 283.853169][ T28] audit: type=1400 audit(2000000243.700:1037916): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 283.875255][ T28] audit: type=1400 audit(2000000243.700:1037917): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 283.898915][ T28] audit: type=1400 audit(2000000243.740:1037918): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 283.920973][ T28] audit: type=1400 audit(2000000243.740:1037919): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 283.942878][ T28] audit: type=1400 audit(2000000243.750:1037920): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 288.747865][ T28] kauditd_printk_skb: 29479 callbacks suppressed [ 288.747882][ T28] audit: type=1400 audit(2000000248.600:1067401): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 288.747907][ T28] audit: type=1400 audit(2000000248.600:1067400): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 288.797273][ T28] audit: type=1400 audit(2000000248.640:1067403): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 288.818438][ T28] audit: type=1400 audit(2000000248.640:1067402): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 288.840556][ T28] audit: type=1400 audit(2000000248.690:1067404): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 288.862842][ T28] audit: type=1400 audit(2000000248.710:1067405): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 288.862875][ T28] audit: type=1400 audit(2000000248.710:1067406): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 288.906112][ T28] audit: type=1400 audit(2000000248.750:1067407): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 288.928346][ T28] audit: type=1400 audit(2000000248.780:1067408): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 288.950354][ T28] audit: type=1400 audit(2000000248.780:1067409): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 293.757703][ T28] kauditd_printk_skb: 29703 callbacks suppressed [ 293.757718][ T28] audit: type=1400 audit(2000000253.610:1097113): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 293.785040][ T28] audit: type=1400 audit(2000000253.610:1097114): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 293.817640][ T28] audit: type=1400 audit(2000000253.660:1097115): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 293.839666][ T28] audit: type=1400 audit(2000000253.660:1097116): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 293.861347][ T28] audit: type=1400 audit(2000000253.660:1097117): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 293.883289][ T28] audit: type=1400 audit(2000000253.660:1097118): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 293.905255][ T28] audit: type=1400 audit(2000000253.660:1097119): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 293.926312][ T28] audit: type=1400 audit(2000000253.660:1097120): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 293.948342][ T28] audit: type=1400 audit(2000000253.660:1097122): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 293.969342][ T28] audit: type=1400 audit(2000000253.660:1097121): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.767641][ T28] kauditd_printk_skb: 30299 callbacks suppressed [ 298.767656][ T28] audit: type=1400 audit(2000000258.610:1127422): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 298.767683][ T28] audit: type=1400 audit(2000000258.610:1127423): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.817090][ T28] audit: type=1400 audit(2000000258.660:1127425): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 298.838219][ T28] audit: type=1400 audit(2000000258.660:1127424): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.860630][ T28] audit: type=1400 audit(2000000258.710:1127426): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.882892][ T28] audit: type=1400 audit(2000000258.730:1127427): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.882922][ T28] audit: type=1400 audit(2000000258.730:1127428): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 298.926061][ T28] audit: type=1400 audit(2000000258.770:1127429): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.948308][ T28] audit: type=1400 audit(2000000258.800:1127430): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 298.948338][ T28] audit: type=1400 audit(2000000258.800:1127431): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 303.778479][ T28] kauditd_printk_skb: 29519 callbacks suppressed [ 303.778496][ T28] audit: type=1400 audit(2000000263.630:1156951): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 303.778535][ T28] audit: type=1400 audit(2000000263.630:1156952): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 303.838849][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 303.838853][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 303.838867][ T140] audit: audit_lost=21 audit_rate_limit=0 audit_backlog_limit=64 [ 303.845168][ T84] audit: audit_lost=22 audit_rate_limit=0 audit_backlog_limit=64 [ 303.851652][ T140] audit: backlog limit exceeded [ 303.859761][ T28] audit: type=1400 audit(2000000263.680:1156953): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 303.867646][ T84] audit: backlog limit exceeded [ 303.871333][ T28] audit: type=1400 audit(2000000263.680:1156954): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 308.787724][ T28] kauditd_printk_skb: 30007 callbacks suppressed [ 308.787754][ T28] audit: type=1400 audit(2000000268.640:1186962): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 308.815869][ T28] audit: type=1400 audit(2000000268.640:1186963): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 308.837257][ T28] audit: type=1400 audit(2000000268.690:1186964): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 308.859261][ T28] audit: type=1400 audit(2000000268.690:1186965): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 308.880540][ T28] audit: type=1400 audit(2000000268.730:1186966): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 308.902864][ T28] audit: type=1400 audit(2000000268.750:1186968): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 308.902894][ T28] audit: type=1400 audit(2000000268.750:1186967): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 308.946263][ T28] audit: type=1400 audit(2000000268.790:1186969): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 308.968566][ T28] audit: type=1400 audit(2000000268.820:1186970): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 308.990586][ T28] audit: type=1400 audit(2000000268.820:1186971): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 313.797865][ T28] kauditd_printk_skb: 29437 callbacks suppressed [ 313.797881][ T28] audit: type=1400 audit(2000000273.650:1216409): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.797908][ T28] audit: type=1400 audit(2000000273.650:1216410): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 313.847734][ T28] audit: type=1400 audit(2000000273.690:1216411): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.869686][ T28] audit: type=1400 audit(2000000273.700:1216412): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 313.890954][ T28] audit: type=1400 audit(2000000273.740:1216413): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.913324][ T28] audit: type=1400 audit(2000000273.760:1216414): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.935280][ T28] audit: type=1400 audit(2000000273.760:1216415): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 313.956535][ T28] audit: type=1400 audit(2000000273.800:1216416): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 313.978967][ T28] audit: type=1400 audit(2000000273.830:1216417): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 314.000886][ T28] audit: type=1400 audit(2000000273.830:1216418): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 318.807704][ T28] kauditd_printk_skb: 29739 callbacks suppressed [ 318.807720][ T28] audit: type=1400 audit(2000000278.660:1246158): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 318.807748][ T28] audit: type=1400 audit(2000000278.660:1246159): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 318.857149][ T28] audit: type=1400 audit(2000000278.700:1246160): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 318.879093][ T28] audit: type=1400 audit(2000000278.700:1246161): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 318.900299][ T28] audit: type=1400 audit(2000000278.750:1246162): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 318.922655][ T28] audit: type=1400 audit(2000000278.770:1246163): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 318.944691][ T28] audit: type=1400 audit(2000000278.770:1246164): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 318.965958][ T28] audit: type=1400 audit(2000000278.810:1246165): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 318.988217][ T28] audit: type=1400 audit(2000000278.840:1246166): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 319.009274][ T28] audit: type=1400 audit(2000000278.840:1246167): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 323.817810][ T28] kauditd_printk_skb: 29391 callbacks suppressed [ 323.817827][ T28] audit: type=1400 audit(2000000283.670:1275560): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 323.817856][ T28] audit: type=1400 audit(2000000283.670:1275559): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 323.867725][ T28] audit: type=1400 audit(2000000283.710:1275561): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 323.889722][ T28] audit: type=1400 audit(2000000283.720:1275562): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 323.911351][ T28] audit: type=1400 audit(2000000283.760:1275563): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 323.933702][ T28] audit: type=1400 audit(2000000283.780:1275564): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 323.955721][ T28] audit: type=1400 audit(2000000283.780:1275565): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 323.977311][ T28] audit: type=1400 audit(2000000283.820:1275566): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 324.000094][ T28] audit: type=1400 audit(2000000283.850:1275567): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 324.000124][ T28] audit: type=1400 audit(2000000283.850:1275568): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 328.828676][ T28] kauditd_printk_skb: 29289 callbacks suppressed [ 328.828692][ T28] audit: type=1400 audit(2000000288.680:1304858): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 328.828720][ T28] audit: type=1400 audit(2000000288.680:1304859): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 328.889230][ T140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 328.889229][ T84] audit: audit_backlog=65 > audit_backlog_limit=64 [ 328.889248][ T140] audit: audit_lost=23 audit_rate_limit=0 audit_backlog_limit=64 [ 328.895556][ T84] audit: audit_lost=24 audit_rate_limit=0 audit_backlog_limit=64 [ 328.902140][ T140] audit: backlog limit exceeded [ 328.910147][ T28] audit: type=1400 audit(2000000288.730:1304860): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 328.917640][ T84] audit: backlog limit exceeded [ 328.921801][ T28] audit: type=1400 audit(2000000288.730:1304861): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 333.838689][ T28] kauditd_printk_skb: 29665 callbacks suppressed [ 333.838706][ T28] audit: type=1400 audit(2000000293.690:1334528): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 333.838734][ T28] audit: type=1400 audit(2000000293.690:1334527): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 333.888372][ T28] audit: type=1400 audit(2000000293.740:1334529): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 333.910333][ T28] audit: type=1400 audit(2000000293.740:1334530): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 333.931721][ T28] audit: type=1400 audit(2000000293.780:1334531): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 333.953998][ T28] audit: type=1400 audit(2000000293.800:1334532): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 333.975942][ T28] audit: type=1400 audit(2000000293.800:1334533): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 333.997282][ T28] audit: type=1400 audit(2000000293.840:1334534): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 334.019585][ T28] audit: type=1400 audit(2000000293.870:1334535): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 334.019618][ T28] audit: type=1400 audit(2000000293.870:1334536): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 338.847680][ T28] kauditd_printk_skb: 29167 callbacks suppressed [ 338.847697][ T28] audit: type=1400 audit(2000000298.690:1363705): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 338.874949][ T28] audit: type=1400 audit(2000000298.690:1363704): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 338.907632][ T28] audit: type=1400 audit(2000000298.750:1363707): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 338.928772][ T28] audit: type=1400 audit(2000000298.750:1363706): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 338.950725][ T28] audit: type=1400 audit(2000000298.750:1363708): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 338.950756][ T28] audit: type=1400 audit(2000000298.750:1363709): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 338.950778][ T28] audit: type=1400 audit(2000000298.750:1363710): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 338.950799][ T28] audit: type=1400 audit(2000000298.750:1363711): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 338.950822][ T28] audit: type=1400 audit(2000000298.750:1363712): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 339.060720][ T28] audit: type=1400 audit(2000000298.750:1363713): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 343.858602][ T28] kauditd_printk_skb: 28927 callbacks suppressed [ 343.858618][ T28] audit: type=1400 audit(2000000303.710:1392641): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.858646][ T28] audit: type=1400 audit(2000000303.710:1392642): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 343.908307][ T28] audit: type=1400 audit(2000000303.760:1392644): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 343.929364][ T28] audit: type=1400 audit(2000000303.760:1392643): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.951591][ T28] audit: type=1400 audit(2000000303.800:1392645): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 343.973909][ T28] audit: type=1400 audit(2000000303.820:1392646): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 343.994992][ T28] audit: type=1400 audit(2000000303.820:1392647): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 344.017365][ T28] audit: type=1400 audit(2000000303.860:1392648): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 344.039703][ T28] audit: type=1400 audit(2000000303.890:1392649): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 344.061636][ T28] audit: type=1400 audit(2000000303.890:1392650): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.867653][ T28] kauditd_printk_skb: 28779 callbacks suppressed [ 348.867670][ T28] audit: type=1400 audit(2000000308.720:1421430): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 348.867738][ T28] audit: type=1400 audit(2000000308.720:1421431): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.917184][ T28] audit: type=1400 audit(2000000308.760:1421432): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 348.939128][ T28] audit: type=1400 audit(2000000308.760:1421433): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.960747][ T28] audit: type=1400 audit(2000000308.810:1421434): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 348.983044][ T28] audit: type=1400 audit(2000000308.830:1421435): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 349.004986][ T28] audit: type=1400 audit(2000000308.830:1421436): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 349.026319][ T28] audit: type=1400 audit(2000000308.870:1421437): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 349.048633][ T28] audit: type=1400 audit(2000000308.900:1421438): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 349.070582][ T28] audit: type=1400 audit(2000000308.900:1421439): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 353.877704][ T28] kauditd_printk_skb: 29073 callbacks suppressed [ 353.877719][ T28] audit: type=1400 audit(2000000313.730:1450513): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 353.905032][ T28] audit: type=1400 audit(2000000313.730:1450514): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.927463][ T28] audit: type=1400 audit(2000000313.780:1450515): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.949409][ T28] audit: type=1400 audit(2000000313.780:1450516): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 353.970626][ T28] audit: type=1400 audit(2000000313.820:1450517): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 353.992876][ T28] audit: type=1400 audit(2000000313.840:1450518): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 354.014833][ T28] audit: type=1400 audit(2000000313.840:1450519): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 354.036100][ T28] audit: type=1400 audit(2000000313.880:1450520): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 354.058527][ T28] audit: type=1400 audit(2000000313.910:1450521): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 354.080489][ T28] audit: type=1400 audit(2000000313.910:1450522): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 358.887631][ T28] kauditd_printk_skb: 29165 callbacks suppressed [ 358.887648][ T28] audit: type=1400 audit(2000000318.730:1479688): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 358.915750][ T28] audit: type=1400 audit(2000000318.730:1479689): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 358.937378][ T28] audit: type=1400 audit(2000000318.790:1479690): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 358.959305][ T28] audit: type=1400 audit(2000000318.790:1479691): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 358.980533][ T28] audit: type=1400 audit(2000000318.830:1479692): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 359.002838][ T28] audit: type=1400 audit(2000000318.850:1479693): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 359.024934][ T28] audit: type=1400 audit(2000000318.850:1479694): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 359.046801][ T28] audit: type=1400 audit(2000000318.890:1479695): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 359.069162][ T28] audit: type=1400 audit(2000000318.920:1479696): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 359.091093][ T28] audit: type=1400 audit(2000000318.920:1479697): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 363.898541][ T28] kauditd_printk_skb: 29181 callbacks suppressed [ 363.898557][ T28] audit: type=1400 audit(2000000323.750:1508879): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 363.898586][ T28] audit: type=1400 audit(2000000323.750:1508880): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 363.948038][ T28] audit: type=1400 audit(2000000323.800:1508881): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 363.948069][ T28] audit: type=1400 audit(2000000323.800:1508882): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 363.991297][ T28] audit: type=1400 audit(2000000323.840:1508883): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 364.013644][ T28] audit: type=1400 audit(2000000323.860:1508884): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 364.035601][ T28] audit: type=1400 audit(2000000323.860:1508885): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 364.058183][ T28] audit: type=1400 audit(2000000323.900:1508886): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 364.080146][ T28] audit: type=1400 audit(2000000323.900:1508887): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 364.102030][ T28] audit: type=1400 audit(2000000323.910:1508888): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 368.907865][ T28] kauditd_printk_skb: 29305 callbacks suppressed [ 368.907882][ T28] audit: type=1400 audit(2000000328.760:1538194): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 368.907909][ T28] audit: type=1400 audit(2000000328.760:1538195): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 368.957474][ T28] audit: type=1400 audit(2000000328.810:1538197): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 368.978566][ T28] audit: type=1400 audit(2000000328.810:1538196): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 369.000812][ T28] audit: type=1400 audit(2000000328.850:1538198): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 369.023564][ T28] audit: type=1400 audit(2000000328.870:1538199): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 369.045512][ T28] audit: type=1400 audit(2000000328.870:1538200): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 369.066888][ T28] audit: type=1400 audit(2000000328.910:1538201): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 369.089392][ T28] audit: type=1400 audit(2000000328.940:1538203): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 369.110460][ T28] audit: type=1400 audit(2000000328.940:1538202): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 373.917618][ T28] kauditd_printk_skb: 29325 callbacks suppressed [ 373.917633][ T28] audit: type=1400 audit(2000000333.760:1567530): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 373.945871][ T28] audit: type=1400 audit(2000000333.760:1567529): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 373.967293][ T28] audit: type=1400 audit(2000000333.820:1567531): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 373.989239][ T28] audit: type=1400 audit(2000000333.820:1567532): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 374.011114][ T28] audit: type=1400 audit(2000000333.860:1567533): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 374.033381][ T28] audit: type=1400 audit(2000000333.880:1567534): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 374.055322][ T28] audit: type=1400 audit(2000000333.880:1567535): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 374.076558][ T28] audit: type=1400 audit(2000000333.920:1567536): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 374.098814][ T28] audit: type=1400 audit(2000000333.950:1567537): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 374.098845][ T28] audit: type=1400 audit(2000000333.950:1567538): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 378.927681][ T28] kauditd_printk_skb: 29957 callbacks suppressed [ 378.927697][ T28] audit: type=1400 audit(2000000338.780:1597497): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 378.955012][ T28] audit: type=1400 audit(2000000338.780:1597496): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 378.977334][ T28] audit: type=1400 audit(2000000338.820:1597499): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 378.998417][ T28] audit: type=1400 audit(2000000338.820:1597498): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 379.020597][ T28] audit: type=1400 audit(2000000338.870:1597500): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 379.042872][ T28] audit: type=1400 audit(2000000338.890:1597502): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 379.064120][ T28] audit: type=1400 audit(2000000338.890:1597501): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 379.086340][ T28] audit: type=1400 audit(2000000338.930:1597503): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 379.108585][ T28] audit: type=1400 audit(2000000338.960:1597504): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 379.130553][ T28] audit: type=1400 audit(2000000338.960:1597505): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 383.937622][ T28] kauditd_printk_skb: 29651 callbacks suppressed [ 383.937637][ T28] audit: type=1400 audit(2000000343.780:1627158): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 383.965887][ T28] audit: type=1400 audit(2000000343.780:1627157): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 383.987355][ T28] audit: type=1400 audit(2000000343.840:1627159): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 384.009325][ T28] audit: type=1400 audit(2000000343.840:1627160): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 384.031336][ T28] audit: type=1400 audit(2000000343.880:1627161): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 384.053630][ T28] audit: type=1400 audit(2000000343.900:1627162): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 384.075588][ T28] audit: type=1400 audit(2000000343.900:1627163): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 384.096828][ T28] audit: type=1400 audit(2000000343.940:1627164): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 384.119123][ T28] audit: type=1400 audit(2000000343.970:1627165): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 384.141112][ T28] audit: type=1400 audit(2000000343.970:1627166): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 388.947667][ T28] kauditd_printk_skb: 29617 callbacks suppressed [ 388.947682][ T28] audit: type=1400 audit(2000000348.800:1656784): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 388.974919][ T28] audit: type=1400 audit(2000000348.800:1656785): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 389.007637][ T28] audit: type=1400 audit(2000000348.850:1656786): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 389.029589][ T28] audit: type=1400 audit(2000000348.850:1656787): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 389.050568][ T28] audit: type=1400 audit(2000000348.850:1656788): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 389.050601][ T28] audit: type=1400 audit(2000000348.850:1656789): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 389.050625][ T28] audit: type=1400 audit(2000000348.850:1656790): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 389.050648][ T28] audit: type=1400 audit(2000000348.850:1656791): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 389.050673][ T28] audit: type=1400 audit(2000000348.850:1656792): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 389.159176][ T28] audit: type=1400 audit(2000000348.850:1656793): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 393.957623][ T28] kauditd_printk_skb: 29399 callbacks suppressed [ 393.957638][ T28] audit: type=1400 audit(2000000353.800:1686194): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 393.984881][ T28] audit: type=1400 audit(2000000353.800:1686193): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 394.007858][ T28] audit: type=1400 audit(2000000353.860:1686195): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 394.029796][ T28] audit: type=1400 audit(2000000353.860:1686196): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 394.051363][ T28] audit: type=1400 audit(2000000353.900:1686197): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 394.073635][ T28] audit: type=1400 audit(2000000353.920:1686198): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 394.095573][ T28] audit: type=1400 audit(2000000353.920:1686199): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 394.116841][ T28] audit: type=1400 audit(2000000353.960:1686200): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 394.139359][ T28] audit: type=1400 audit(2000000353.990:1686201): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 394.161427][ T28] audit: type=1400 audit(2000000353.990:1686202): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 398.967576][ T28] kauditd_printk_skb: 29496 callbacks suppressed [ 398.967591][ T28] audit: type=1400 audit(2000000358.810:1715699): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 398.996269][ T28] audit: type=1400 audit(2000000358.840:1715700): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 399.018283][ T28] audit: type=1400 audit(2000000358.840:1715701): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 399.039627][ T28] audit: type=1400 audit(2000000358.890:1715702): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 399.062147][ T28] audit: type=1400 audit(2000000358.910:1715703): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 399.084074][ T28] audit: type=1400 audit(2000000358.910:1715704): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 399.105486][ T28] audit: type=1400 audit(2000000358.950:1715705): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 399.127839][ T28] audit: type=1400 audit(2000000358.980:1715706): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 399.149745][ T28] audit: type=1400 audit(2000000358.980:1715707): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 399.171020][ T28] audit: type=1400 audit(2000000359.020:1715708): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 403.977592][ T28] kauditd_printk_skb: 28778 callbacks suppressed [ 403.977608][ T28] audit: type=1400 audit(2000000363.820:1744487): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 403.977649][ T28] audit: type=1400 audit(2000000363.820:1744488): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 404.027173][ T28] audit: type=1400 audit(2000000363.870:1744489): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 404.049123][ T28] audit: type=1400 audit(2000000363.870:1744490): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 404.070340][ T28] audit: type=1400 audit(2000000363.920:1744491): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 404.092683][ T28] audit: type=1400 audit(2000000363.940:1744492): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 404.114632][ T28] audit: type=1400 audit(2000000363.940:1744493): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 404.136201][ T28] audit: type=1400 audit(2000000363.980:1744494): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 404.158497][ T28] audit: type=1400 audit(2000000364.010:1744495): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 404.180460][ T28] audit: type=1400 audit(2000000364.010:1744496): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 408.987748][ T28] kauditd_printk_skb: 29119 callbacks suppressed [ 408.987763][ T28] audit: type=1400 audit(2000000368.840:1773616): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 408.987790][ T28] audit: type=1400 audit(2000000368.840:1773617): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 409.037186][ T28] audit: type=1400 audit(2000000368.880:1773618): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 409.059158][ T28] audit: type=1400 audit(2000000368.880:1773619): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 409.080403][ T28] audit: type=1400 audit(2000000368.930:1773620): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 409.102742][ T28] audit: type=1400 audit(2000000368.950:1773621): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 409.124676][ T28] audit: type=1400 audit(2000000368.950:1773622): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 409.145975][ T28] audit: type=1400 audit(2000000368.990:1773623): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 409.168238][ T28] audit: type=1400 audit(2000000369.020:1773624): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 409.190162][ T28] audit: type=1400 audit(2000000369.020:1773625): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 413.997582][ T28] kauditd_printk_skb: 29429 callbacks suppressed [ 413.997614][ T28] audit: type=1400 audit(2000000373.840:1803055): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 414.024861][ T28] audit: type=1400 audit(2000000373.850:1803056): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 414.048395][ T28] audit: type=1400 audit(2000000373.900:1803057): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 414.070490][ T28] audit: type=1400 audit(2000000373.900:1803058): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 414.091845][ T28] audit: type=1400 audit(2000000373.940:1803059): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 414.114134][ T28] audit: type=1400 audit(2000000373.960:1803060): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 414.136074][ T28] audit: type=1400 audit(2000000373.960:1803061): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 414.157452][ T28] audit: type=1400 audit(2000000374.000:1803062): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 414.179762][ T28] audit: type=1400 audit(2000000374.030:1803063): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 414.201703][ T28] audit: type=1400 audit(2000000374.030:1803064): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 419.007984][ T28] kauditd_printk_skb: 29547 callbacks suppressed [ 419.008016][ T28] audit: type=1400 audit(2000000378.860:1832612): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 419.008110][ T28] audit: type=1400 audit(2000000378.860:1832613): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 419.057458][ T28] audit: type=1400 audit(2000000378.900:1832614): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 419.079390][ T28] audit: type=1400 audit(2000000378.900:1832615): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 419.100878][ T28] audit: type=1400 audit(2000000378.950:1832616): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 419.123138][ T28] audit: type=1400 audit(2000000378.970:1832617): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 419.145198][ T28] audit: type=1400 audit(2000000378.970:1832618): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 419.166434][ T28] audit: type=1400 audit(2000000379.010:1832619): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 419.189193][ T28] audit: type=1400 audit(2000000379.040:1832620): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 419.211401][ T28] audit: type=1400 audit(2000000379.040:1832621): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 424.017801][ T28] kauditd_printk_skb: 29731 callbacks suppressed [ 424.017816][ T28] audit: type=1400 audit(2000000383.870:1862354): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 424.017844][ T28] audit: type=1400 audit(2000000383.870:1862353): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.067279][ T28] audit: type=1400 audit(2000000383.910:1862356): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 424.088455][ T28] audit: type=1400 audit(2000000383.910:1862355): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.110803][ T28] audit: type=1400 audit(2000000383.960:1862357): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.133086][ T28] audit: type=1400 audit(2000000383.980:1862358): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 424.154145][ T28] audit: type=1400 audit(2000000383.980:1862359): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.176318][ T28] audit: type=1400 audit(2000000384.020:1862360): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.198742][ T28] audit: type=1400 audit(2000000384.050:1862361): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 424.220886][ T28] audit: type=1400 audit(2000000384.050:1862362): avc: denied { read } for pid=140 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0