last executing test programs: 26m3.235023942s ago: executing program 1 (id=4729): openat$ptmx(0xffffffffffffff9c, 0x0, 0x121301, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x421, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffad}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x20004, 0x10}}}}}}]}, 0x48}}, 0x0) 26m2.897049002s ago: executing program 1 (id=4731): r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000140), 0x129202, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000000)=0x5) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000040)=0x3) mmap$dsp(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x200000f, 0x11, r0, 0x0) 26m2.567285722s ago: executing program 1 (id=4733): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x6a0400, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) 26m2.376173638s ago: executing program 1 (id=4734): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mount$bind(&(0x7f0000000400)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18d883, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x89901) 25m54.26840393s ago: executing program 1 (id=4735): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x5f, 0xffffffffffffffff, {0x29}}, './file0\x00'}) 25m53.457622544s ago: executing program 1 (id=4736): r0 = socket$packet(0x11, 0x3, 0x300) socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x68, 0x30, 0x829, 0x0, 0x0, {}, [{0x54, 0x1, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0xffffffffffffff6c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x2}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) sendto$packet(r0, &(0x7f00000002c0), 0x0, 0x804, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @multicast}, 0x14) r8 = add_key$keyring(0x0, &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000080)={r8, 0xfe7, 0x37}, &(0x7f0000000200)=ANY=[@ANYBLOB="656e633d6f6165702068617368960000000000000067353132000000000000000000007dd5629b574cf975c98841222e0000000000002000"/78], &(0x7f0000000580)="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", &(0x7f00000000c0)=""/55) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000140)={0x0, 0x100000001}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000280)={0x3, 0x3}) 25m53.405752726s ago: executing program 32 (id=4736): r0 = socket$packet(0x11, 0x3, 0x300) socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'xfrm0\x00', 0x0}) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x68, 0x30, 0x829, 0x0, 0x0, {}, [{0x54, 0x1, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0xffffffffffffff6c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x2}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) sendto$packet(r0, &(0x7f00000002c0), 0x0, 0x804, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @multicast}, 0x14) r8 = add_key$keyring(0x0, &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000080)={r8, 0xfe7, 0x37}, &(0x7f0000000200)=ANY=[@ANYBLOB="656e633d6f6165702068617368960000000000000067353132000000000000000000007dd5629b574cf975c98841222e0000000000002000"/78], &(0x7f0000000580)="ca885a93489c402a0952f69851defb030af3a51e5280927ef56fd22ffdc8d9467eddf9b75287a1e02d7ced67a40e9f7e93abd31869faf1da5df8e6824d239da8fa21d184d10a65f76060eadc3ef03c8ac536fdb1a3726522c3e6a71fc3bfdb30fe8cf58ef23d2f0476463edb11581735ddbac8360921f0f9d806a708f9d69f94e91818091bcc4bf26cbde724c23cad234c676d2c05d05b3fdfc64d7a36aa47a35bbe39eee6e272e6033ac9cbc17f7bb675ecbece11e2049f8d41fe35473d44082d804dc53644c036594e6c8b72846968a476ad84a261a2613f553f0ea93e3a98b2dc90be75c8db17adff19285a8d57340752069d623faf13653266da533fbb685ebcc3afb9802807050d4fe41b962fd28dc09dde58bfc2f4adfbf04352f37d2a5a3aa8cc47de9286a1fc7c4ef1aa078041397cefbbb29baef9a52a3bb32a2bebc23bd4c4b45cb1aa090f75e637aa437404a2b201ad1bce5bf6c0a8e5851e9c3f38eb6f702c85ea13149dc5ce875370c0b382a0f27aef22608f119be5d33143e5a6515f0b3fe033de8b9694e30b0c9109dedd0e1d88f71ca2ba07f4d6fe23e8cefbcd039575241a5238590049fffb44b2b19b5183300c926e87be44bbb13cf543049f2d0fcc0eea7c73a3b212d6609807b5ad54ce0ec8440433507171f478f4e40e755c4af39e7599f14b5c110f9eb3eafa7b67f412319693dadde444fd90118d695ca9a00b3206fb2558d12b21c46b74c7355756aa8bf592b3b903f858e2642cddd2134c81b1ff18df17f02a40107f34e486c5f3a5315180cc320f10be62b1313edc07a19e98eceb2dbee9f1074a580e5b246bde3599798eeca4c74392e21a0dfd5f35fb9ded45d7aeec59fac48022a733dd0ac2f1be04e082e7cdc2976099ef9ead39f37a1bd04fdc7d7940f472afd790796ac80631bb91d67119e207a8b48c2aaf62e028eeee7d02a4e333c73baeae04f97ea608da47dd38e079c409da2b433fa72a43c05f1109b5c5995514c971d2fdcdd63630bc07c3831babace876f58120cdb6709b5abbb0c21a7434ada19b414b7ba1611a4fde55603fc592bb56410ea834694dd7851899cea4a8a6c37947867a282bbb830fd1943c248e186966cd99f515fb8d9a6ac14ee02045767dc24a08a28b57b5ae24133e6d1e2599687aa8311174443abb8048ff7fe65a6a9e1697b883447a6ae14eab521e94983d31c3b2b7ca1fd3245f5da07f9b3c89e2d9c1b5a8ce9a3d8eba5fe1f2d39e30abed41aa7de2dcaa51a08444a5dcff35be6d9ee0db281b9cf5a516cac9f506b92d6a205e7112653d1f25b8dbc4a04c57518c4b1db92eddb00ffbf649e53eaa896951647ae69a746aaa2cf2ed5c7bfdaf00177a9bdfc6df99a433e3bfa11b51ab6c8658af17245cd91617649a935a17ffb6b97a80d45f2feb3f67b7fc75b7b7f17358966f970e4f10168635a116ae6189c48e0009f3aaf9b799596af3a05712605ae2b9bc4b26a737f7ca6e8c4537ef376479016d82464ae30956df6ff59e519139ee72a6597effd64b5424be0589c93035381c65a3ac7869576c521323dc642a57fbafa400152de5859ce849d1aaefbfba019d3879ed22767eb054ef54389f35e2c43eed937be2e7bf40ba78c00ac4c871bc6c768f03a7cf4f83f20411d8eb10f4201ecf1eb730bd3b8d9202f788dff8c077c32eba967e4472b89e46c868678fe934a7581a1864d94dfc40cef7d297a54dea740badc4a4365b6930d2704348c04660b16a3a8d00d213c003339c1f9491a0df362f40908e25df47d2f5710474f9075f6d06aa83c20f132d5635fe1a9beab8af064474918cf519f1cd13daf62825929fba44489ad43d78f96b73a866f1677423548cba19fcdd68b3d2320f61e29c1fdb6f838d4ffdba7e63118f321013863fdb8ab3f2d42060f19a32791e444f5cec8c792a0dd715c541dc84ebe1c7850aeed042361e2940e868946e7c85f638082820cf362e8ee8af10e972a2cf747d15b2a40f47901ed29895e454f8e6df305d30ec649e870447e28bd0cbf183f83255ae0bb8d75363329a9e8939e4208c201c2984297bf9da6aa3a3d0591de204f14a69aae95027b456f293adde33a1960343928f95f1ed8a6ef6d7dfaed6af7079062de4418d93552af5782a8acd28a3d8c2fcc13ea842a6cdad4a98239695bd5bc586527c27348734d10b09763c73a9a4053c1c29ecdfe8fb37210bde2a8ed7a5283d0d3a9a0a283378705bb90c8ff9115deecdd26bb116f213f4cc4e658c266199559a5b43e3bd3b3c2236608747e90186ded54b21c241e536e7263b49287fce13eaed956cd5078faf1fabcf2443f428dfeda88d8d5cc56037b2d620b3b3752d9d812a8e517d7872f206f05967402105b703244a68c58ff41decbaa35982b00f65954c51074b006d9e4edde3eecee82389505eafb9ec8048b73686d30a8f104bdb1ec6bca3681c50e854f8c0ad568139d30ea7987ccb099b16334d269f3d665f75ffff0524f4955abe79cae3bfae9b806d274bb46045c31265830a2c8155079b9939c0f0f83ec1ea4066e8deebfffd4d45f92eab963f996082ce4bd76e0f0b4ef2efb027d7b0831f56a152de4f6dd698ec89ef7775270bfb4738748e552b248bb23d24fc12fc3f3cd25bc7c1c069002068f9c3a006c6a5cc4e69796b5fa1e2d4b935e41abfb24f37fe28b53a154050a561b3a431dd06a94507a88a1f788b355c9d03413447a659a2c8eb8408301596124d79f0ae1ca17a33f155187f8b7753a844928dd83d3de5f0e5b71f33c19ed20cfcf10f775edf61c6ae7ad3c9c5b654f2115a9294cee22c69b04ca5035801c71874fcedfdeb3150cc61d2c69a8f21d396eb781eee289b9ea131fb87460c7e6ec49061649e8d283c77e58e44bc67b8e1f02f79df2308c3775eb1efbcee4c0d7623c51d623bead2a8658e10bf06c0f0f147b6f0e27ed24b968cf430ac7f7905134ee18184a115611f79f6364f298ec0e6ddc5d0ca7c0aca51017371c241b6f903e687737bcd3fb8caed866a7e5d577dc5c5a6ba76ebd58dfb77d757e0b5df0945e810d55fd1f9a7ae87590a07dfc8ede678e26eed3f3c063a22b6626197ae729c934a6ad6ade65e996c97943ae99556763067e8d53491d9dcb65627b69fc77579da871addaf9b7e221cd70cf3695c416ce5f7e9867b4c666e10e65a4af80cbade34e0bae720f19342641c876d58b6ce2f659a9f8a3f7a64a442d2512c2edbb1278a9a10c287b4b78fbb8eeb9ee1c9bc8ed359dcb26ce98d96dbc6c272338a4fdb6b418e29980f890b2e9538c2c77d5c5951418cda06a3062291b986d06c5c4229c5565e885f4adbe6adbf42564cbddf64884ee187a996abbbddf2c11a0fd82940540511852bc1ceddb7847e9e4496be959c1f4764740b00a30a546f486a5d55cb0abfd5650d2a6fee7d45232f4fc5ea5837d7c1fd37827cc60428ace8564d9f85d202d1e562664701825a2af1b7c2d3fd4fd06f66e9aa259a6bc75e56fa539577de2a2b88dbfb37a62b20cf931541a94932106c349c62eab621458d4609a9ace6cd989c1a6482f6ab75b87079c38341167b3722ef2fc74a360b50a1909d6e4de07cde8b4da6e0f5979598ead1b7a62f5a6c1d27e9ffc49aa77573ae1f5f809bc98bc56954114b4b5445559a8b38eadf42ecc5d422f77a3cf2bc7a3a3b1bc84575ce4d2e89c538f4d284648021608d2fd8153d754db0fae97d18a8478862cb2ba3f4e9b27f15d1d223a16b377d81c7b91a70cde4348dee382c8fa7406cea520ce15aba82834e47b465321b1375095a4e9d82fba2543758c1fbe3adf2a3a854d83939b95b631398a1f6bd3a77d57616337c4ba3cc4ef02db84875f41d6ba8b0c6b985c34b3da6a1751321d546bcad78195b1d99a0165e69f6ae7d820185731e87915a08703d2d4410710f2b4c6c0ef78f25c83c86db566abd1862d81a08283520d461e60dd0d58d60b6cea08a8b26f4e47e4864b3bfdf80bdacedbd4e8a982d1f0ae186fbd7847ee7b77e8167177ca0ed81c0744ce5a178b95b3a9fa09398f2c91323a7adf5138abda10f44e793f2eaf7ab0f6dd76d0429dc37a4d590aefd12b4ba722600fc02678aa40c034628521f59fffdd19c1e69a368ade964de6b08d1a2245bfef67d4417fa67c1c76a07ea47ac5d22e6948826546a451fb9ec7fd24b8413f3e183019e133f6eba25033e6088b860881a4104f9be547fe87e5587ada05788825c29f80fbe0b6fccf3926201664562d9cd27c048a6457f67901db1190244231af3ffad41cd5873f4a1b1504a5e76be691c06a7bfaa0a149abb14a3b9ae7c62279a22e9419e6c3f738ccad1cafb3370a5d14cf67bfb27cb7e2cf685debb6bc3a874ed8fba1726e8ccbd5164cb4277521b4dbb97396f3408fc0cc770c12886bb1a5d8fb06797242f14ab196316da08444b4596dcbd5dc1c9f1b0d4850140ca74899bbb7e4efac171d08fa647542d6c21d89a0f00c19c0fff18ba23a5a8eee9e5c46725ae6ab4f7ad0384f01655e7138fe93020eef88009b7e1fb0386d030bc7aab51705ac11b26eea99fdb4c0d02249a50692e34fc8791571601ae66098c2bad4a3b9a56d6cce1f5eb20fbd64e66bac8566790b7e748ea9a160d607cb50e47a01c5c507507fc0c779b7b06270c689fc61fbd47370503c93b21e6455aa42297af78c57f1a4061a0c84f11908bbaed2bc705f4e81217f9e6e13491f7728290b4b933f10ef298f00e48a1c5e9a4fdf717895d488a4cf8b0c5a46bcd42c48252d4d15b8b8ae8dc49e144344878d667514e4ff7a038e51b25b086082eb3419937af692a59166b6a1e148f697b3bfa79e6bf13d83d5a9afe0ca6af2f1f193e7573374da7d372947ea9538e817fd19f46966faa59104cc727230f314da31788081efb363697263479b62119fbc98ef670c7dbcbe783bf75839d53cbc3394dd85fc2bc97c05066309b872c9d5b5d2a0086638c297ee75903f93f79cb5ac98b03a7f18b15c64de4d4cee1afac6281144ac3626c6a87b1e577ca71412c3187fad872907b93a7a2bfe64a447284602525a5e25d821fcab9ca79d995e08946a4993e2b1176ad242fecf7d12269b3d4c6f3f9d8c8f38d865bb15699de7076d9bf7603a7411b327c5cf5cc195024ba451d1e8c22f8113dee62334a93e65e7bff48eb3285e4b375e9198a7a8487652312d2007d3ccda7543a7750916691ea93bc60011ab6e5aa6787c6cd15b225f5736c8083e580ecc5539a636bab03b3b24f9a49ef92c8cd518907e8c1b45f4b5324dc66072d631163467ccc74e3923a7f13c9cf4f90363b3b6567a3020e6f450f245b6a81a105cbe39531d05128cdab8745577e03d3ef6f495090a496c4b7f0ed7c4f4adfe0ebbb807546e73bdd55d89891a86607e47b80dc17bbf70ba693f15febcb0cd407da962bccfdd6d6bb6ddc9c88860f8b2f320e0bcd5a640fa045ba8bcca9427be7a5e5d9cc14b4e6d33fbcbd80c03443a90720680fe9d7d1b853a6560bf1dfe6826b46083aefc393fbd0e38c45a08a77c2aebaa889026e7c74ac33afae8d90d3a520b0abb96ad12ca1746a6999b40a44830ef086da45486ae98175da8b58a604fe11ce6f07b01212c5c677c96041ae45063854be21df254b47f5e5f7e698121f57e3161c482a40ceddd90fd15b5290a7a165127b8da09238de01a7cae98f04cac876f54e14a3c13d011a16f43e4475a8f6153d198b68a365cfd1203908c4291e49695e", &(0x7f00000000c0)=""/55) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000140)={0x0, 0x100000001}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000280)={0x3, 0x3}) 7m26.030127149s ago: executing program 2 (id=6133): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x42, 0x1e6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r2, 0x5451, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x10000a1, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x400000, 0x100) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x1403, 0x20, 0x70bd25, 0x25dfdbfd}, 0x10}, 0x1, 0x0, 0x0, 0x82}, 0x44) inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = dup(r4) write$FUSE_WRITE(r5, &(0x7f0000000100)={0xfffffeec}, 0xffffffd1) write$FUSE_CREATE_OPEN(r5, &(0x7f00000007c0)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0xa0) close(r5) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) socket$packet(0x11, 0x2, 0x300) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 7m24.64838789s ago: executing program 2 (id=6134): r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x201, 0x0) write$tcp_mem(r0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r2, 0x5450, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140), 0x0, 0x1) sendmmsg$unix(r4, &(0x7f0000007b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x480c83, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r5, 0x5451, 0x0) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$TIOCSPGRP(r6, 0x5451, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000001c0)={'macvlan0\x00'}) ioctl$KDSKBENT(r7, 0x5452, &(0x7f0000000040)) bind$inet(r1, &(0x7f0000000440)={0x2, 0x0, @local}, 0x10) r8 = socket$inet6(0xa, 0x2, 0x0) sendmsg$sock(r8, &(0x7f00000013c0)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x0, @remote}, 0x80, 0x0}, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) ioctl$BINDER_FREEZE(r0, 0x400c620e, &(0x7f00000000c0)={r9, 0x0, 0x4dd9}) 7m24.150139815s ago: executing program 2 (id=6135): r0 = memfd_create(&(0x7f0000000100)='+\x88\xc7s\x00\x00\x942nodev\x00\x00\x8cZ_Pv\x03\xa7\xc1\b\xec\x90Q\x85\x83\xcd\x16\xdcw\'\x8a\xe5N\x8c\x17\xfd\xc5\xad\xd5y\x15\x1fx\x17\f\xbc\xd1.\x8cA\x17\x86\xb7-j!Y\x92\xd9\xc4\r8\xd0\xc9X\xa7\x11\xa3\xf0\x8a*\xbc\x87\xcd\x1fl\xfc\xf3]\xb8\xbd\x02\v<\fl\xa6]\xa5\xfb\x05\xcb\x9c\xe2\xc8\x05\xa5\xa5\xeb\xa9\xef\xe3\xf1b\x81\xec\xac\xb6\x80\xd5\xf5S\x85\x06O\x05\xb8\xa1\x15\xcc\x17\xe8s\x95\x95B\xee_\x98\x91)\xe7\xa8+\x8c\xee\x83@q\x16\xcf3\x0f\x81\xa8\xa9`i\x01m:\xcc\x1c\xed<\xcfA3n\xfd\n>\x03\xae\f \xdbH\'\x05\x82\xdbLE\x14\xcdq\x1abcf\xdb8\xe9a\xa8\x00'/201, 0x2) fcntl$addseals(r0, 0x409, 0x10) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x2010, r0, 0x0) r1 = userfaultfd(0x40801) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r3, 0x5450, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r4, 0x8008551d, &(0x7f0000000200)={0x4f6, 0x1, [{0xc, 0x1}]}) r5 = landlock_create_ruleset(&(0x7f0000000000)={0x8000}, 0x10, 0x0) landlock_restrict_self(r5, 0x0) r6 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r7 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) r8 = dup3(r7, r6, 0x0) ioctl$VHOST_SET_LOG_FD(r8, 0x4004af07, 0x0) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x1}) 7m23.849484034s ago: executing program 2 (id=6136): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x100000001) r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000042c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r1, @ANYBLOB=',rootmode=0000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) chdir(&(0x7f0000004340)='./file0\x00') write$FUSE_INIT(r1, &(0x7f00000066c0)={0x50, 0x0, r2, {0x7, 0x21}}, 0x50) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f00000063c0)={0x10, 0x0, r3}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002180)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x1) r4 = fsopen(&(0x7f0000000000)='bpf\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r4, 0x5450, 0x0) syz_clone(0x88200, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r5) sendmsg$DEVLINK_CMD_RATE_DEL(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) openat$cgroup_netprio_ifpriomap(r5, &(0x7f0000000180), 0x2, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000180), 0x142, 0x0) 7m21.150147504s ago: executing program 2 (id=6137): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) dup3(r0, r1, 0x0) write$midi(r1, &(0x7f0000000440)="92", 0x1) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0000000000000004000001000000a8086fb364b62aebd4c21305432f37ae5737671b51dde417ea0b19b94fa1fe4a9722eb6ddd01cf7c8f9c68a8bc271ea939cb37c3a03f2ee44c770b9c49537eefa14165ff91781913d9b4e6aa753e7f9fbbb152bc3f5f22530d647769cb03"], 0x14}}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@bloom_filter={0x1e, 0x0, 0xa11f, 0x100, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = openat2$dir(0xffffffffffffff9c, &(0x7f00000028c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)={0x202003, 0x20, 0x4}, 0x18) faccessat(r4, &(0x7f0000006280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x160) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@generic={&(0x7f00000018c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3}, 0x18) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRES64=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = dup(r6) write$FUSE_CREATE_OPEN(r7, &(0x7f0000000740)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}}, 0xfffffeb3) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) syz_fuse_handle_req(r5, &(0x7f0000004280)="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", 0x2000, &(0x7f0000001000)={&(0x7f0000000080)={0x50}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r5, &(0x7f000000c280)="92eeee4c04d266254cd56dd72983fb15421d055feeef8476a32a7ff5081906007713cf0b96e0ef74cd284086cf34154f3467aa00fea40bdeadd9e2745a0b63c1656373db9314d545642c927f131368b070c15a9793836d9bb3010776fef47e35b04b72495150815b1a2730365980e10ec24e626cd24eda9fba7d2de4af8342ccc1a0db4dd94697aae3428df222c73ce40912cb590c8382fb5f4537b4c936be1154012a83ae5ed221a3b4ba0b25fbe6093445a4881eba22df05a83e11c7f76b4a2af533123b300cc4cd70c232415a81793d544dfff73392b2a42e79a152278e112140af20f2c74735e490976ee2e6dd8e95738150b433476b8f4ef3ba4e4ad247ee5f3f52724edcc2928a1b769e2a1421d489672346d85be4713bea67125ce9d57e70266b690907fb1313cfd3cadd3a168f7b5dfd55b0b41a63dde956c578b7f65920c6d93a4ed05e73d1104490802eecd16d525b639151e003ad9412d94229a3d4e4e72b01b66bf4a5340b68f9411495c3273d2119bce2c24a138ac825a10ae86bbe35097f16606d77b00dc2d7c540e9c120359c70f88e23de4c0d37296f8dfe119b3319799c7c94b8b8bcaf7eca1bcfafad9126856dd55be061998defb033bbba5a17e915caa9cf9abced8458bb4fdeb99c162caf684771ca2dcdc58a073c70a6d4099c12ff1689c30bcaf8d1b76a7c81931ec7ebb8b7bbac32a88cfef5317c6cf316046ac99151ea807886c2b59ac48294fdcd7fe876f8d1c08f2b811e4497cf8cc6735e57a174ae0954c240ed2921b2e24586533c32fcce8d4a279de82a1e73d1a13d7184a6a4122a01e8ac156bd350309572167b0f361d813c20c60aebc1dabfb9572ecab69eb57185bd95d5586bc1d944d61a852c0f1f242a148100418ca89332d4020830afea8b9a5afd3bf03f5016be33ad8af50e47592467cd3b86a64d35fcc9b0453df25071cc204a9120fec06c33c69de7382f96c02fbaa4fd00cb1b22f6e37606c8ef821097f20dd1bff60a1dc7e938f069634cc8a09c089b88107e94eaf07246132bb3581ff08dc6ec4682712d151f95fa76cefac0942f8fc9be7eab17cd26bed95b6f673ecd88e4fe66c1117b35bf8ca997fa2892407e2e00c5b9b5a739fe8cac446994f3d185029881eb1c8cbea6f00946a328aaa6e9cfff4b616102374e9b72178d66fb2c0e7a76c092f4225571b8ef35f205e450337e5d5a33908208c0f33da1c138f8da4bdb2cc04b42e3002f89ae27da9fd8971a7faad6dbe745addf22803f23eef8f4f1bc17d00705908784b723948dd4e15fd2b4314a6017f0f9827ee968df579db5e8fc2858139f91605a022541a0e483a6637435f5e2a897347d08dcdd64a22829fcb893c3f2584310a059c813030dd9bd9318b92ab43f264600985de014598b786248844a31b4315ae8016af278c18f495f1ac5fde2b58ba7b29b2ab32f8baa3f5f4a5f786c0fd19c3afb19b9bc08f42e7dbc9fb9c0d8fa90ff695b4453e7adebfbcd0cb962cfe256a245fe777237597dd9c2733f56f4b89fbdbd79cd516e207b5d544b80df7f28eef005561e4a35f3fa213ff7e3b3a9f98c1f020adab66a8ca606cd42dfee315d02f037ec0f62516379f98f73fb4c11b54257d1fe5d312e62198444a05cb8216d98ea121f4fcc6e1695dc1cda8ba2a843020c2a5b35be8fbc8e753e88817af689067591b506ea1c7864c0d3bd0217cdf6bf2a11a1dab225a2197bbbe0f6cf277eb2b9a918fb018eb6aa2a3e453b56252d4619d108b39e9d67d6f8845709417373d4d1f5a7a43a39c158b4e8eed1802e7ee2a026f3ba6345e1dadb8019856a157c288eeacbc0745f454e3d5f167a9a62f348a203eb9cca54fb02ff3cb2aad788c2328068cca70cf484b58684de8b4e4cc0549cb671b1cf9227e644c508f5b0830ad835b83348c712024f0b2613ca2cf64d4fadc960c58688027bde20a5b8f42fdeb819c899040349ab0ad40793fb95956a5b8f9d7b55a35522e97c92115f18d9cf5b336117a185dbd54ce8848f02bdba59bb335d29acb5c89a241053dc6d7fc4feb4bbfc604e3ba3e0f00cd398bb12fdfe4af9b332763fe3f7c340ec930944fbcd2649d9397b7a8bbcbd992691bcde14d55ed43ae93beaf983a766420e0fd135d57f8b022e958780fd3a8b29cfb721316cf553ba5d87fcd8eea955dc400271118fd9e4c568939fe7eb444e1176fc2d0249fa316ac730629c884207d02209d3de7293a16b16efaaa4128f1ab86766e9fdcfc2cbde49e101986ce6fd0ace10407fa7a85606a8e9725fdb870109c3ebab3c2abc745f6c62d37251629a6a9f7fdafe92884ac7831dce7ab780377ed96691efc0dd21750decebb034a6d8e1c0f5cb77eb0ca18d14ed8cfdd2fcacefd16753d1788c19ac2e680fa65732a034046e81e6a949c1897c73e1a9c2bc6407368f1679511db6c5d717b8c849e6be4fb386ed7000ef81e5c294c7a35cf153b4e8e01afa3d24f747366aa9dca541013a824add4badbf70f489b6a9008f5fc341cdb1f584e9b9dc58712425440e727813ab4aadaa37e28608c147a3743caf7c13df58cf68d1baea85a01ab9420067002f074523acb403a34965c9bf1947b3804c0b792e00248b64aa1eb48c127a0a1372c2a8d95dd2a0b77382831ac2f121cfecdc4e3fbe6147cf49c10b2e5439b7081b8e2e002764b9a63f20e0c119c08ec1b0e53ae2cd46358b36634d72c97db6bdea28b1ef54214146ee1d1ae06f66ba2bb76d0f428bcc88c2123fe37fb4e317c1b5e582eb5ea9ad454cf5f67b12f66259b3ff3065cf355612214f02fce425a1dd0ac02bbff4316ae64fc9da6063d21eee514b481b57cc908cfc3b65eaea8cd983651300b9ea5670860ee9bb457e288ec5913c40053607e01c9aa03f7e44259fb29fae4d76f339a4b53da6adc705341b4511cfbe47acf43195b97e002a9b387d9b101c24539c8e1a9323011ba675ff9a8d92ebe55af80a893e8d8450c242c0adf58f994d60dbb222c8c940a634894c0634e32ae3d94652255b15fa7f5b096b46fd0fef4d60ce97460d37dd60f2199988c87e17bc304a2196236e70827d4a5bc85fe4b9b8195460e8a0a1250ef18458986f245012aebe16ed1f8fd01eb24d5663c5f9c8ad8fe934228f6bfcb2425b3be52085a090bf161a1d0db1afc968cc7490ccf933d92ef757801d953f1d7db3645c1fb771521a7fd253e0f33cb58b950aab00ae4717bf07646d1da0eac862bde639c955cd67d132766f1db477f8629cb1c9c2ca00be27ae7fc86a980d82e9400189a7e92fc4c6c710ef6a8c555f7511ecf36af897bc2e489c7617584e46a3878c8b3184f1371e90c18662c98daaf74bb701d410dcc83107b87b7ec8432e5152a284eec2408ed249948f7b3aee65eb43fcc519e02dd88e1129d92d1c5c9ef398b8e85add68beb5318882ccae5297a2f38199b7d0c33a68e54ec5df89372f9cc4fddc146a5de7b93de0c492bf56b2206c8f6c0b31cd2a6f805fce60a212ebe0a36e2550a248076cf130046c50772a067c124300afb3a1b824cfc15d2d9171e2295b3641b23315a6752de2b781e3b1e7fa692247486860a63cc01942fd0e1c25f15035626dbe89a28b8f27805d846a7c46d4a8eeaed8b8c57be0bbbb12abf20b58ff0b7dc1fa658d5d0592eab99b09660ee2de946815eeb9f832f73f3367b5c3482fda44b641b313fad8287353be3831306110f04484aa21740047944b85d32920d97c931151e1fe38e7d4151e08c27276f155249d0fb6f7c66dbcaa6329306a205e41d6e89f74858343bf92ac1c87392c1554f97601bc5a444c1ca5cdc9f90ca28e0e2ba2b61d33726f8c5264d9fa725c71f36baeb8bdc36b60a88ed2668b3c6c72c44f3515a771c2a6bae35b216ef44cea6c353fefa8d604373d3c49b16a44a004dbc1186be3ebdabaf230cdb00ebc3ef1ba1afa6a4d69065dce83dc8fd5363f92d847975a171fbd2adfa8121bc16a7b55152f2a1b4d72d7ae1e927c10c7c5b82cf42d8e3e97cedf99ed6d6bdb13bf80e9cc05b09b295de4dd222729d618bdcb6b019505ba306d8c4b12eb7be9f34acef330898bcd00bb7868f6c95d1b21f6186a2a65beab56dd98e41efb0c44e770dbe99c4693cf78907d01526d22a1f1037400993e5462d57e92fb58d721815cc75713c93a6ea4cdbd21f95a17e1f3c00fc5b747d8eaad204d1ccaaee53378c145c3a3621e086ae825ebeded5496932a4c14e160b5ab3c8a0757fadbe27c3851ce38328ca57c0ea4b99b9bd4d640f91506ad3544499dfea5da5e8604ec8ee0545dc539bcac8553d3c9399f9a7b67fd4cd2ba1a062577e2238a4acaf08dda8fb041c5ac9e0a14c2ca977e8c8b81bbfdfc64d8a1a6b87732873ea3dc1a6f09a71743d8fc2da4e02ff6bb9ea1f61afeddbe3d1ab62a7e39c5419f8ac795a40bdabe1226edb24afe65616c2ea58d10f9980fe49a04569d4715708c4b9fe9534dc89867cac058d93e7670d1bd54a030a7fe4f406fe6665e41f95dd5950feb0b082c07ffe552940154431bcdb1893a8c3ed745a5f731577f7b22b8c895496cadd61a24f170d5a88c5d95cf944e635ffa6b06a1e11e4036746fea69210dc0020b5d5806a13e6905fdc462be95f5a2c7fdca32a2712d79087544f19327fc5a2e80f2c832411b022ebb4b5a59e9267a2cd1b587edf6ebd3655e63a3864638c6f2fe55626fa943ad85b4dd34a58febf359c2f465cb1db48afcd320bc348c3e386fe6a329f2494f44d6e5a720088b76e118642073ebb748b4be450fc41bd07690d1c4ca0c99fc2ed5d025e8862f47fc594b7234e011fea5ff354aa515841f970d4ea02bba028b3ab03481b89587473a69316563148d5094bfeee618d545506aabc10b0cbabdcf293beb16f96b5642b3b83714e221e9d36be7e899bc84b1a819c474b6763122149827bae34c7cdd30318b13cac9f7103c5b9b3b6637b37267786c5f6b3f52777ccbbb87ca44e87ae6225f2e25ac4e5b7aa1d7a85a5f9ae150914e79e97f27f9fa85f6b4771a12afb42157720f74b3d7f7f963da18696ba775b4d5605f4976ccb19a4ef26dc94bc87233251a88917fae838aa46231f1683bfd89c6d5d6fa4633034f402f79e2c475cf27120fb0dfb82f9f7e948e74e44dfa67127acda64574d1b1f004614398e38d5470100c38c117de531635fb47070c117912ece62501e422d7aa43094a0d6fad03ab228f0a9d281fdb2ce068abb340d42b2455d93b0d7a58664cc163cf160e91e3f161c6bfe8caf8d88553b924dc3a0ae109485c42efa0340fc11d31e6ff1ef1df4da7d46e4f8516bd19eec402f8bc0828d01adf6092615edbfdb37479dda88430bb189c06698e92e663321ac8c3a1bd10f60d6b3751b44e40cd36d9fc9d7b6892d9cbdab8c0c4ccf02bdd762f99d2db44fe8d05482a98a448cda2ef38ad38fff5d813d0cb66eb58ebf2d1c36257326cd632363177e19720eded90a12793affd319fbf71a0099db8617d58b6736b75ec72295693017812fa4ba1ad4fd9ce3d3721e13e4c822e336bbd855663c4e71e29c51a630e619b31c022009bead97cad9bfc6c6cafdb8acd01d661a7172a0641fbeb3b1a0832338f716f2003c610cbbbcc4a0c3cb9f9aef831a01b0a06739331df0874c22590cc82c626ae5678a2ab0b82063a54bb9023009ed90ff667d6fb843d88ed9c4700285111506d4d6f7d98800443920180427520b2f39aeb9a8c4f23f9efdc7c24a9c1275ebb214e4913331ae371c82e214e583a88b927b5d096814e2481574e8250eae2d96418e6c0c2ab77030cd01158ce3f3ad5ffe4080826eb209f7862387e0f1edd6724a7dec63c11c2c596ea01c174ff8f7f193a42c703983d5731cfd0851a290dc99b6507b5500af3ae7cc6b84476b2ebf6429e96f9fbe4050b77c32d0fb0915deb35eca0e149b54ac663cddb41b8aa25c24242aa21179020f9ee7c1122fd4acbe8eb632ff003ae77aa5ec622dec5d9e3fe6e80aa22a57c4e9f562186501880fbe7a7abd5dd5ca99d80aebc8495f3217abd7445d7491d18407445a887e9aa7ca6e528482d3d30d6f823bd6cab28986b3d8dbdcd86ffb4febab09be106ea50a23c0d73b900e40fdb73254e3efbedba257110ee8c4a49d6589ccfb4722e72282bbcd1d600a0f253dce9b97fb3a0d327af71ea309e15d3b35981e6cf70515a91ff3fe89eb1c3ca56c1425ea808e3109ca098ad92147ddef89e92887d2907d95a5ad1fb0793f3c31ace6169a3615f279bcfe490a05999d7959db474f0446c8bffc70e058152e7d6d6ced91b607c86c3941cadcd380137a2da688a608a3fe94a7685e24b48d91f4ea9cd048c6fdbee3a78904c43fae5afd19e528846e795e7041d125c1132d93d2f78084036bd80e7a0b327e2961967cdd6794682192e4ab8f101a3fc048a761c38f0354247b64094c304b3afda759ab74d40f7e7c4de89b7b8655265ec86ef6ea20abb714ee27be97aad7633088f3ae0ae3a877d1e30d145364275b694118d66593f3e2f9853f2fa1b0e702be523e7510d3fc35a813a84f732d5a8f2e70be291b0be4de6d009c8602dd7b5a80010fd6ce5199fd576798c79ac3ebdeef0e81bcea494c93514d6a1aa5e28ddaabcdde1f80caadb910ce1a76d2f39f49d23ca76597ddf9ec4a09590bdcec37dd62ce2e9768e5071d624ee7a0bbb24f0fa740a4ac4fc39c56a4bd58ace6963b1c8a94ee0167780799e8aa698e9b8d6de98029304d85e4d640bcdbc9981de46bca8560d16de49a63c3650e64fded3d6a0c8c3e0ceb294394622c4d1d86f7a34434d1ec35bc733c9112f31c3c763910ecf9b9b3da48abafcb8a1458b01687c924851d36c3111131e595ac87068cc01fba95ddbb364173d58d8082bdab5663857bc322bd9e8d7847280b37440dadca497b455542d502482e438e618eee6ad8f9e1336afb592e246ae79fe82b110b3b0cf13c31bba10e17cc08dc523b4747a34d1afcedd7c3364a5fd3098ea860413d38ae4af81bd7dd34ce8949410c0817b95dfabdfcec1e0490dd661849411e6eb4ecd026674dda6b4cc5092d07f2cd18aa75cbc9d8d898729bd9acc4de874dd6329c335accf3d42a43145e1e241eb06c08587ba6f385b2cdc6efc02d8fb11292580a555c129a8f4edb517805896cc6d1272ef846d00c517718dfdc3a7ac03bb23e600168f95f7e3aa7001cd9d9e0db202dc225a129680ed75280d84fe88db7206858eee5a83ada9608a1c5e8f184958088029de407642813a9083dbf2367693a767dc54c1bda1f520c8bab5c86ab5d59de057478ecaeee59e6579ccfdc5a1a59e12e204ffbc9e2334ec0120c8e0fd9a8b6126021c52559bbf1c043eacf5f5f9aabcaa8844df6be38da4e42dc8ecdd801f2244b5cad2680e8b130f4315ce95b7b4503dd292eab05390085bbc318d5d7113c204760376714a8bcd6c2508490ba67ec9654bac85a8572cbd86cfe024891f3b8c066ef18ab0354e4e0cd7eec4e85936f97925de39aeb5aabb0cc1a26d8ccef8e9fe7c81a3131e833d27eea44610d7283762eaf8784a8914aa52670e7c37d2258797c8c0dd760e5a2be99f574437f66bd9bbba5da69b594bc38d1851bb225c514d41374467998cf206c752ae7567272bdf20f1a12145f51574d6a69fc30fe50ddbab297285186829ead9e9e78b311966acaff3e2cc6f799f9a1d1b1288c70a22305b33d86bedb03752455be93948ca9c860a84ddcfb66dd817f40c6a86ab5b310279ddb31dc84367ff2597a209c6b925b7d6990af8238d91704cf65b04b5424753647381477c93993f82593ee39d1021e3d6c792be8753c64c5b3149bcbe86db5078332929b80dfc2aee1eba66289df3c570b6efaf08848137e2a0e7ae4663ee16a458f3a01af8c2801c9055b354771dc6eb64f15e49c7ebd3d0f86dd1189b7e85f3007881ff7346ae769f4f83599afbe9bd4398fd201a3fa00ccce1434bf87bf3942af3b8d377c747c5661463e447ddf6a20260ec5c87410a871fe97be3799a1a638ef16639b68212377e52a27f32cb0df13abf6968c3d92bb77788f43e33f68907c28963b9e4a2ac1f1ba3edfbcd8fb11fb6b685144e3b54b1d5733291514ac5644bfa2050f1fd5cf2e642e01952c20e563b9a5413e90b21b5ed0157de64997cff6564f8ddc2f30a3c49bbfda9535529576330206bb07f9a604b3a3c7e297248e6f219e7594670ca8a07273eb5694285d8bc13950c46b2e057b70a97e648c0377b3b8958bd9498917af86f7d66fbb42be83742a4f3ab001d3d4e1eb224683a213cefda62a9d59457f8d84278789664e3d1a08521d82c31cd7e56c3d9a395260257afcd48336f694b78fb90c99c81f2f5187264a26e7d33d30867d3a032dc31db7223a6740bdfc569f82c66fa520bb1fc055b063cf04d61d47a46fa8a75a4ba62d6b2183678c3eec3ca0fbbbfeaaa0db143646925bd05a72fc571d7c64a4c1ad1e8631d5012075502a65f4bdb5abc316bb7066c40166666d40292aa52c5272d6e37c9c0b3bd3dd3e50b9c79337145104970e232d3717d5c10254fd28207cb84b05c2fce1ed1a202c5f6498483061baf7cccc4c2d055325e64d6f48ed399e76bbc638bdadbd87445d778f9c1d1500c0096d18533ade54f04e487d6fc24bfae4e189e697fbf378deb83777c32bcc3464b10e9cead62b66f22f089419500ff53e6dd17faca3e2ed5561fec38bdec77975b97b8475ed5cdb5a64bec5faad72d8a97964d0c127f9a31fe4f645e1b28174fa21c406382f03bf6b3956165fe7e95d191a4fc7ddc06af37fbd774caca5424708e77a56eaf3950b764fb8fab5307b7669da1dc361c3c9c844c6c95d9d4bb0e2843bcd449507ad75311dc2290da2e55f4d794f9a86da5f698799d5255352a8590351fa8f733287697688b5c9390b86767ce180cfa45ebb8132a7c2cc93cce4f977da36612b5e36c0df6b39a6a7c16d551e114c7c7e413c2528e514b19d4a8265cf5c2f7fde0eec5e395fbc47a51a036ea8800fc367e106fd95a412e42d3a67815d8a67bce8aea6fb7274bceb1b8b1e5358e320303b607a82639adf7b07f4b6a41d9bf9a2b8fd784e0b6add7f7d0a43537cfd7d341a01c69654621445bdd11d2e1b57fce90b0062a9b4f3b9e831140905171de0c1ac62bc6d04eab6ea3de7615f9b56245829fb533e1047a2e38a36dea4b73e52672b7e3a8b902dcf62075ef88a95bb6132ed88bbad05855d4697906983f03b6e07bbd5b5a9cbd0a09888a2d3a06f1ddf000e45df2586df3e44ddfaacf3ff30bd1c12dabec645a329b18527b627418127c761f03f16043efed0390871a696965078462c7eac1109d13e545d6d306bc981b3407fb79282790e3f66c9acf53ca2d8bb7b19e2b98c8a0973dadc2e54734f9e22e0af08ecce9809001c5da72fcc635d64aec5c8d727c1e945235bfcc95b25bf6c5d30b39078b10a285841932d5fe3c4a7407684bcab82ea798c820b036cea15d06ee866b6e4acdf741809dbf20fa54e94d4fe893151ec6b7d13fd486dc625aadba7c7d9ae8c0d7ed04a4ddcafcd7cd5d0fc1ce8b8900f0b3ec251b0546e32b2d844884984f05ee3ca0f7a27a2040a8c226c073bcb820bdb4f09191563a5c431a626bf8520d321e6f070720fecbabee5bcd079494ee30e2bdaea2041b5db6997981fa7e625060e9deee1f0ae10015f54999b3bc883ecdd8c8c2bf9faf5e263daf57ff3a1bfc9d322eee139acbab9bb54188d9fe93f3c67ae61820f12b04737325bfe027359323253428f51429b45f41f3281ac304b8481649cdcf1471efa02d488b2d58698426178810680a10adaa7a22dbd8965dc859d72a762daa762898f53a2b63cc4ce1c57ca9f838ff0b3936cad7dc175e5fc5af7810cbe7f9b297c676227438bf9fbb61ec787082250a150e655e63c225a4d496b7886d4f0e1fa3bb71f8ede646af4137d8e783905b52d41db76dcda0b1eadf714a4a19b1c9842f9f0e39732ceb0e0bf4be40c53021e2c819695ee08d32c8a0b8a1c24e7d1d1ab42ef071fa823a7598695e1b611c8d508e43dd0b3164a337642c560a54dea7b43cb6293622246d8ce093a14142c957deb31406b96cb359d7d806a7bbb91c4da0bc888bb626e5cc5600e6aac8c5c3ef311e104535536acc8c90c6be3d86a3588842c7dbb7122b0b2347a73619da54ea7eda55a7b2aa53181a792239fdcee73c11cc46c5ae2ad652be85583ccd9710fdfe405624adebc98e6515825dba56bb1e473f3219f9e2cca52a48454079d5a55af678cc9cc00ed0c5311cd9f53fad2f4ebbbc70042b316efb2d2fe5383c0c8682e41ddf06e5005532116770de70b0a4409121757bbd5c540b1f34ac688bcbb671ea7f84895c895bbf012cd2ac8f8099b6fd4423c723db5e281b8877a6a5662c4719f1818b0032c80dc476891c4b407c21d334ba706154b5fdf23d5368f701f758c8f4e5784ff795e126ac9e4792d3d31f923bf62e68256506670af776aec3d91b194babe359beba7aba86e3a4596acade4de7b78ac62fd1cc1dec79a5ad5d9184589e3810746aceb349f02070f8d9790448a51804ffb1e56f14b8ac50281069b2e7ac82874e8828694585ff3f55ed883c0171b47ce38e12ff22883ab685af6be4d3a780254114a5d15e735f8f0e49ea174996a51428ed673a4a57346206a7b740fc653793e004c8ccc3860610af6ab6fcaa7d13193149cca113d7e319d6a9b0af79c8eb4d57d5bab3d1cfacbd3473c46809b1f5a6fd9448fb7a62184a1d11a6a4cb0caa812ae50102fdb140ff13f4754bebd5627a79e679784ffb4e70a0db9ccff6f1eb283e02059fdc63879d82a9cb7b8867031eeb7ce2a3ed1b6bdf0cc2f4b5e7aba4550ff6572da620abb9c52ce0f3cf473c1cdedbf8301323e5fe0676f81a6c90c5c3bb2bd20931494384f98b0545c10ec86e3399d85b94dd9262b2c23057b75dabd170b30bbc471b5f6709445e096f6f3839ad33547f6a2c30c80519ddb95a12b7e9cf4d5a9f8fe847783c2907f3279a8338376d1fc81805a97969623369f19e3d58bf7b0581b46c913130ede4c80c432be5bdb65687521cc3d4a7c067b43d01a1c005fad731b695349d7091c8f7eeace1e52f237ae5fc160f2693d9cdbae1d54eb6b5ce5a7a18545757f84c6061613c11d5b399e12e32e3e97c0c99765969cadb487ace198bdfbfd9bf21441c2df06b6ca884920e25d389cc1268381ab6fb0cf160a7473be3d0bfc8fa60a678f2fa0b73c8316e1f72b61ec6511ff173fae450d33c4fa7e9bca79c40303f8298cb4e270027177028c54684b23a86f0e4cd3aa6871765c87aff073225243586e2c292ae8c14f6d5b972c73f910d2ae35f78551a5391f768ae0e054ed18933cff72aa1119c7d19a11a788c098ef5d5cead60925fabf8a3062069b93976a252e2667c0f0aa33c09a5ea1a3960bcba429aa0cb758eca796de6209c0c525b19c230fc6926f27d844f17fafabaf14cba4ddb769b9f6fd123f9d4f4d9585ba51d6f7ef0175087ea76a41c09a5d14cb65effb08c5dc798cf00", 0x2000, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x20, 0x0, 0x0, {0x0, 0x18}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV(r8, 0x5000940b, &(0x7f000000a300)={{}, "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"}) 7m20.789921764s ago: executing program 2 (id=6138): openat$procfs(0xffffffffffffff9c, 0x0, 0x41, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) prlimit64(0x0, 0xe, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x6400, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000100)={0x400, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x3f0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1}) (fail_nth: 13) 7m20.789599605s ago: executing program 33 (id=6138): openat$procfs(0xffffffffffffff9c, 0x0, 0x41, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) prlimit64(0x0, 0xe, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x6400, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000100)={0x400, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x3f0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1}) (fail_nth: 13) 13.513777419s ago: executing program 3 (id=6430): r0 = openat$null(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) close_range(r0, r1, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000140)={0x1, 0x1}) socket(0x10, 0x800, 0xffffff7f) setsockopt$MRT6_DONE(r0, 0x29, 0xc9, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) 13.079782362s ago: executing program 3 (id=6431): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100, 0x0) getdents64(r0, &(0x7f0000000340)=""/66, 0x42) 12.576317197s ago: executing program 3 (id=6434): r0 = syz_open_procfs$userns(0x0, &(0x7f0000001900)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 12.059066272s ago: executing program 3 (id=6435): prlimit64(0x0, 0xd, &(0x7f0000000180)={0x3, 0xe8b4}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) 9.275668955s ago: executing program 3 (id=6442): socket$kcm(0x23, 0x2, 0x0) 9.233006747s ago: executing program 0 (id=6446): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, 0x0, 0x0, 0x101, 0x0, 0x0) 9.009215353s ago: executing program 0 (id=6443): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) statfs(&(0x7f00000000c0)='./file0\x00', 0x0) 8.529177197s ago: executing program 0 (id=6444): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x10, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_io_uring_setup(0x5129, &(0x7f0000000040)={0x0, 0x7aa, 0x2, 0x0, 0x1c9}, 0x0, 0x0) syz_clone(0x28280000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 8.119120419s ago: executing program 3 (id=6445): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x749}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = dup(r5) ioctl$TIOCL_SETSEL(r6, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x13d, 0x0, 0xd6e}}) 2.210405604s ago: executing program 0 (id=6447): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc000000190067"], 0xfc}}, 0x8000) 451.314867ms ago: executing program 0 (id=6448): r0 = socket(0x10, 0x803, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, 0x0, 0x0) 0s ago: executing program 0 (id=6449): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x10, &(0x7f0000000080)={r1}, &(0x7f0000000100)=0x8) kernel console output (not intermixed with test programs): 656): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21813 comm="udevd" name="platform" dev="sysfs" ino=359 [ 4484.863757][ T29] audit: type=1400 audit(4483.827:141657): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21813 comm="udevd" name="dummy_hcd.0" dev="sysfs" ino=21136 [ 4484.916504][ T29] audit: type=1400 audit(4483.827:141658): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21813 comm="udevd" name="usb1" dev="sysfs" ino=21165 [ 4491.211192][ T29] kauditd_printk_skb: 1410 callbacks suppressed [ 4491.211287][ T29] audit: type=1400 audit(4488.616:142739): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4491.212531][ T29] audit: type=1400 audit(4488.626:142740): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4491.671962][T21843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4491.674697][T21843] audit: audit_lost=19063 audit_rate_limit=0 audit_backlog_limit=64 [ 4491.677472][T21843] audit: backlog limit exceeded [ 4491.681798][T21843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4491.684644][T21843] audit: audit_lost=19064 audit_rate_limit=0 audit_backlog_limit=64 [ 4491.685955][T21843] audit: backlog limit exceeded [ 4491.687719][T21843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4491.688975][T21843] audit: audit_lost=19065 audit_rate_limit=0 audit_backlog_limit=64 [ 4496.245077][ T3089] audit_log_start: 782 callbacks suppressed [ 4496.245264][ T3089] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4496.246775][ T3089] audit: audit_lost=19283 audit_rate_limit=0 audit_backlog_limit=64 [ 4496.247699][ T3089] audit: backlog limit exceeded [ 4496.248517][ T3089] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4496.249302][ T3089] audit: audit_lost=19284 audit_rate_limit=0 audit_backlog_limit=64 [ 4496.250182][ T3089] audit: backlog limit exceeded [ 4496.263428][ T3089] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4496.264399][ T3089] audit: audit_lost=19285 audit_rate_limit=0 audit_backlog_limit=64 [ 4496.265235][ T3089] audit: backlog limit exceeded [ 4496.266673][ T3089] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4501.264391][ T29] kauditd_printk_skb: 818 callbacks suppressed [ 4501.264539][ T29] audit: type=1400 audit(4500.686:143552): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21846 comm="cmp" path="/lib/libbusybox.so.1.35.0" dev="vda" ino=369 [ 4501.267270][ T29] audit: type=1400 audit(4500.696:143553): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=21846 comm="cmp" path="/lib/libbusybox.so.1.35.0" dev="vda" ino=369 [ 4501.269279][ T29] audit: type=1400 audit(4500.696:143554): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3263 comm="syz-executor" saddr=127.0.0.1 src=49696 daddr=127.0.0.1 dest=30006 netif=lo [ 4501.309158][ T29] audit: type=1400 audit(4500.696:143555): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3263 comm="syz-executor" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=49696 netif=lo [ 4501.316881][ T29] audit: type=1400 audit(4500.706:143556): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3261 comm="sshd" saddr=10.0.2.2 src=43260 daddr=10.0.2.15 dest=22 netif=eth0 [ 4501.335114][ T29] audit: type=1400 audit(4500.706:143557): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21846 comm="cmp" name="/" dev="vda" ino=2 [ 4501.337269][ T29] audit: type=1400 audit(4500.706:143558): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21846 comm="cmp" name="/" dev="vda" ino=2 [ 4501.339329][ T29] audit: type=1400 audit(4500.706:143559): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21846 comm="cmp" name="lib" dev="vda" ino=195 [ 4501.352951][ T29] audit: type=1400 audit(4500.706:143560): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=21846 comm="cmp" name="libc.so.6" dev="vda" ino=370 [ 4501.355296][ T29] audit: type=1400 audit(4500.706:143561): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3263 comm="syz-executor" saddr=127.0.0.1 src=49696 daddr=127.0.0.1 dest=30006 netif=lo [ 4502.850626][T21854] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4502.853414][T21854] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4503.332668][T17904] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 4503.680471][T17904] usb 1-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 4503.686079][T17904] usb 1-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 4503.687857][T17904] usb 1-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 4503.689063][T17904] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4503.857536][T21852] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 4503.969390][T17904] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 4504.396751][T17904] usb 1-1: USB disconnect, device number 15 [ 4504.425237][T21861] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4504.428312][T21861] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4506.357124][ T3089] audit_log_start: 3860 callbacks suppressed [ 4506.357269][ T3089] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4506.358904][ T3089] audit: audit_lost=19723 audit_rate_limit=0 audit_backlog_limit=64 [ 4506.359322][T21866] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4506.359818][ T3089] audit: backlog limit exceeded [ 4506.360021][ T3089] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4506.360139][ T3089] audit: audit_lost=19724 audit_rate_limit=0 audit_backlog_limit=64 [ 4506.360268][ T3089] audit: backlog limit exceeded [ 4506.360988][ T3089] audit: audit_backlog=66 > audit_backlog_limit=64 [ 4506.363340][T21866] audit: audit_lost=19725 audit_rate_limit=0 audit_backlog_limit=64 [ 4506.383890][ T29] audit: type=1400 audit(4504.686:146251): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=4079 [ 4508.898843][T21876] udevd[21876]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:27.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 4512.125981][ T29] kauditd_printk_skb: 4061 callbacks suppressed [ 4512.126163][ T29] audit: type=1400 audit(4510.595:147553): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4512.128729][ T29] audit: type=1400 audit(4510.595:147554): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="sysfs" ino=1 [ 4512.130513][ T29] audit: type=1400 audit(4510.595:147555): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="devices" dev="sysfs" ino=7 [ 4512.142843][ T29] audit: type=1400 audit(4510.595:147556): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="virtual" dev="sysfs" ino=813 [ 4513.113941][ T29] audit: type=1400 audit(4511.745:147557): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="block" dev="sysfs" ino=11411 [ 4513.115950][ T29] audit: type=1400 audit(4511.745:147558): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="loop3" dev="sysfs" ino=13377 [ 4513.117859][ T29] audit: type=1400 audit(4511.745:147559): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=3089 comm="udevd" name="uevent" dev="sysfs" ino=13378 [ 4513.120018][ T29] audit: type=1400 audit(4511.755:147560): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/sys/devices/virtual/block/loop3/uevent" dev="sysfs" ino=13378 [ 4513.143607][ T29] audit: type=1400 audit(4511.755:147561): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=3089 comm="udevd" name="uevent" dev="sysfs" ino=13378 [ 4513.145439][ T29] audit: type=1400 audit(4511.755:147562): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/sys/devices/virtual/block/loop3/uevent" dev="sysfs" ino=13378 [ 4517.183030][ T29] kauditd_printk_skb: 96 callbacks suppressed [ 4517.183136][ T29] audit: type=1400 audit(4515.655:147659): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/etc/udev/hwdb.bin" dev="vda" ino=192 [ 4517.185362][ T29] audit: type=1400 audit(4515.885:147660): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4517.186300][ T29] audit: type=1400 audit(4515.885:147661): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="sysfs" ino=1 [ 4517.187258][ T29] audit: type=1400 audit(4515.885:147662): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="devices" dev="sysfs" ino=7 [ 4517.188270][ T29] audit: type=1400 audit(4515.885:147663): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="platform" dev="sysfs" ino=359 [ 4517.189153][ T29] audit: type=1400 audit(4515.885:147664): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="dummy_hcd.0" dev="sysfs" ino=21136 [ 4517.190152][ T29] audit: type=1400 audit(4515.885:147665): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="usb1" dev="sysfs" ino=21165 [ 4517.191217][ T29] audit: type=1400 audit(4515.885:147666): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21874 comm="udevd" name="/" dev="vda" ino=2 [ 4517.349864][ T3089] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4517.349989][ T3089] audit: audit_lost=20646 audit_rate_limit=0 audit_backlog_limit=64 [ 4521.012739][T21829] usb 1-1: new high-speed USB device number 16 using dummy_hcd [ 4521.246424][T21829] usb 1-1: config 0 interface 0 altsetting 12 endpoint 0x87 has an invalid bInterval 0, changing to 7 [ 4521.247331][T21829] usb 1-1: config 0 interface 0 has no altsetting 0 [ 4521.335597][T21829] usb 1-1: New USB device found, idVendor=06cd, idProduct=0115, bcdDevice=d9.c3 [ 4521.336284][T21829] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4521.336842][T21829] usb 1-1: Product: syz [ 4521.337284][T21829] usb 1-1: Manufacturer: syz [ 4521.337782][T21829] usb 1-1: SerialNumber: syz [ 4521.368155][T21829] usb 1-1: config 0 descriptor?? [ 4522.369289][ T29] kauditd_printk_skb: 2439 callbacks suppressed [ 4522.369383][ T29] audit: type=1400 audit(4521.415:150016): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21894 comm="syz.3.6355" name="newroot" dev="tmpfs" ino=2 [ 4522.369585][ T29] audit: type=1400 audit(4521.415:150017): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21894 comm="syz.3.6355" name="/" dev="sysfs" ino=1 [ 4522.369782][ T29] audit: type=1400 audit(4521.415:150018): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21894 comm="syz.3.6355" name="kernel" dev="sysfs" ino=831 [ 4522.369947][ T29] audit: type=1400 audit(4521.415:150019): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21894 comm="syz.3.6355" name="/" dev="debugfs" ino=1 [ 4522.370100][ T29] audit: type=1400 audit(4521.415:150020): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21894 comm="syz.3.6355" name="sync" dev="debugfs" ino=941 [ 4522.370253][ T29] audit: type=1400 audit(4521.415:150021): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=21894 comm="syz.3.6355" name="info" dev="debugfs" ino=942 [ 4522.370408][ T29] audit: type=1400 audit(4521.415:150022): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21894 comm="syz.3.6355" path="/sys/kernel/debug/sync/info" dev="debugfs" ino=942 [ 4522.370628][ T29] audit: type=1400 audit(4521.425:150023): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21894 comm="syz.3.6355" name="newroot" dev="tmpfs" ino=2 [ 4522.370820][ T29] audit: type=1400 audit(4521.425:150024): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21894 comm="syz.3.6355" name="/" dev="devtmpfs" ino=1 [ 4522.370983][ T29] audit: type=1400 audit(4521.425:150025): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21894 comm="syz.3.6355" name="char" dev="devtmpfs" ino=756 [ 4523.799390][T21829] keyspan 1-1:0.0: Keyspan 2 port adapter converter detected [ 4523.840956][T21829] keyspan 1-1:0.0: found no endpoint descriptor for endpoint 7 [ 4524.357283][T21829] keyspan 1-1:0.0: found no endpoint descriptor for endpoint 81 [ 4524.357804][T21829] keyspan 1-1:0.0: found no endpoint descriptor for endpoint 1 [ 4524.358187][T21829] keyspan 1-1:0.0: found no endpoint descriptor for endpoint 2 [ 4524.358576][T21829] keyspan 1-1:0.0: found no endpoint descriptor for endpoint 85 [ 4524.358969][T21829] keyspan 1-1:0.0: found no endpoint descriptor for endpoint 5 [ 4524.418442][T21829] usb 1-1: Keyspan 2 port adapter converter now attached to ttyUSB0 [ 4524.427698][T21829] keyspan 1-1:0.0: found no endpoint descriptor for endpoint 83 [ 4524.428998][T21829] keyspan 1-1:0.0: found no endpoint descriptor for endpoint 3 [ 4524.430153][T21829] keyspan 1-1:0.0: found no endpoint descriptor for endpoint 4 [ 4524.431443][T21829] keyspan 1-1:0.0: found no endpoint descriptor for endpoint 86 [ 4524.433926][T21829] keyspan 1-1:0.0: found no endpoint descriptor for endpoint 6 [ 4524.445086][T21829] usb 1-1: Keyspan 2 port adapter converter now attached to ttyUSB1 [ 4525.375559][T21829] usb 1-1: USB disconnect, device number 16 [ 4525.521491][T21829] keyspan_2 ttyUSB0: Keyspan 2 port adapter converter now disconnected from ttyUSB0 [ 4525.576731][T21829] keyspan_2 ttyUSB1: Keyspan 2 port adapter converter now disconnected from ttyUSB1 [ 4525.580650][T21829] keyspan 1-1:0.0: device disconnected [ 4527.415869][ T29] kauditd_printk_skb: 1757 callbacks suppressed [ 4527.421107][ T29] audit: type=1400 audit(4526.685:151389): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4527.605160][ T29] audit: type=1400 audit(4527.005:151390): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=3089 comm="udevd" name="queue" dev="tmpfs" ino=4079 [ 4527.661490][ T29] audit: type=1400 audit(4527.085:151391): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4527.705214][ T29] audit: type=1400 audit(4527.085:151392): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4527.805203][ T29] audit: type=1400 audit(4527.125:151393): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4527.889986][ T29] audit: type=1400 audit(4527.285:151394): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4527.911408][ T29] audit: type=1400 audit(4527.315:151395): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4527.955873][ T29] audit: type=1400 audit(4527.375:151396): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4528.056401][ T29] audit: type=1400 audit(4527.475:151398): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4528.102128][ T29] audit: type=1400 audit(4527.475:151399): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21874 comm="udevd" name="/" dev="vda" ino=2 [ 4532.606376][ T29] kauditd_printk_skb: 1693 callbacks suppressed [ 4532.606480][ T29] audit: type=1400 audit(4531.604:152162): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21874 comm="udevd" name="/" dev="vda" ino=2 [ 4532.607923][ T29] audit: type=1400 audit(4531.614:152163): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21874 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4532.608805][ T29] audit: type=1400 audit(4531.614:152164): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21874 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4532.609702][ T29] audit: type=1400 audit(4531.614:152165): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21874 comm="udevd" name="data" dev="tmpfs" ino=11 [ 4532.610661][ T29] audit: type=1400 audit(4531.614:152166): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21874 comm="udevd" name="data" dev="tmpfs" ino=11 [ 4532.611594][ T29] audit: type=1400 audit(4531.614:152167): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21874 comm="udevd" path="/run/udev/data/+usb:1-1:0.0.tmp" dev="tmpfs" ino=4121 [ 4532.646766][ T29] audit: type=1400 audit(4532.084:152168): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4532.651829][ T29] audit: type=1400 audit(4532.084:152169): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4532.667544][ T29] audit: type=1400 audit(4532.084:152170): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4532.668635][ T29] audit: type=1400 audit(4532.084:152171): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4537.613713][ T29] kauditd_printk_skb: 1451 callbacks suppressed [ 4537.613882][ T29] audit: type=1400 audit(4537.054:153623): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/sys/devices/virtual/block/loop3/mq" dev="sysfs" ino=13462 [ 4537.619856][ T29] audit: type=1400 audit(4537.064:153624): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4537.635499][ T29] audit: type=1400 audit(4537.074:153625): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="sysfs" ino=1 [ 4537.638684][ T29] audit: type=1400 audit(4537.074:153626): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21874 comm="udevd" name="data" dev="tmpfs" ino=11 [ 4537.640684][ T29] audit: type=1400 audit(4537.074:153627): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="devices" dev="sysfs" ino=7 [ 4537.642268][ T29] audit: type=1400 audit(4537.074:153628): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21874 comm="udevd" name="data" dev="tmpfs" ino=11 [ 4537.657411][ T29] audit: type=1400 audit(4537.074:153629): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="virtual" dev="sysfs" ino=813 [ 4537.659617][ T29] audit: type=1400 audit(4537.074:153630): lsm=SMACK fn=smack_inode_rename action=granted subject="_" object="_" requested=rw pid=21874 comm="udevd" name="b7:3.tmp" dev="tmpfs" ino=4124 [ 4537.661417][ T29] audit: type=1400 audit(4537.074:153631): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="block" dev="sysfs" ino=11411 [ 4537.684022][ T29] audit: type=1400 audit(4537.074:153632): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="loop3" dev="sysfs" ino=13377 [ 4538.314208][ T7718] usb 1-1: new full-speed USB device number 17 using dummy_hcd [ 4538.596118][ T7718] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 15 [ 4538.597753][ T7718] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 4538.599158][ T7718] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 10 [ 4538.687290][ T7718] usb 1-1: New USB device found, idVendor=077d, idProduct=04aa, bcdDevice=5b.d8 [ 4538.687997][ T7718] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4538.688520][ T7718] usb 1-1: Product: syz [ 4538.688921][ T7718] usb 1-1: Manufacturer: syz [ 4538.689315][ T7718] usb 1-1: SerialNumber: syz [ 4538.709425][ T7718] usb 1-1: config 0 descriptor?? [ 4539.087642][ T7718] usb 1-1: USB disconnect, device number 17 [ 4539.514071][ T7718] usb 1-1: new high-speed USB device number 18 using dummy_hcd [ 4541.821186][ T7718] usb 1-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 4541.821919][ T7718] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4541.867254][ T7718] usb 1-1: config 0 descriptor?? [ 4542.062321][ T7718] cp210x 1-1:0.0: cp210x converter detected [ 4542.704087][ T29] kauditd_printk_skb: 3025 callbacks suppressed [ 4542.704258][ T29] audit: type=1400 audit(4542.064:155230): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21874 comm="udevd" name="platform" dev="sysfs" ino=359 [ 4542.735078][ T7718] cp210x 1-1:0.0: failed to get vendor val 0x0010 size 3: -32 [ 4542.810857][ T29] audit: type=1400 audit(4542.134:155232): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4542.812602][ T29] audit: type=1400 audit(4542.134:155233): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4542.838776][ T29] audit: type=1400 audit(4542.134:155234): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4542.840772][ T29] audit: type=1400 audit(4542.134:155235): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=3089 comm="udevd" name="queue" dev="tmpfs" ino=4131 [ 4542.842797][ T29] audit: type=1400 audit(4542.134:155236): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/run/udev/queue" dev="tmpfs" ino=4131 [ 4542.853946][ T29] audit: type=1400 audit(4542.134:155237): lsm=SMACK fn=smack_inode_setattr action=granted subject="_" object="_" requested=w pid=3089 comm="udevd" name="queue" dev="tmpfs" ino=4131 [ 4542.855266][ T29] audit: type=1400 audit(4542.074:155231): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21855 comm="udevd" name="/" dev="vda" ino=2 [ 4542.856268][ T29] audit: type=1400 audit(4542.144:155238): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21855 comm="udevd" name="/" dev="sysfs" ino=1 [ 4542.857178][ T29] audit: type=1400 audit(4542.144:155239): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21855 comm="udevd" name="devices" dev="sysfs" ino=7 [ 4542.897397][ T7718] usb 1-1: cp210x converter now attached to ttyUSB0 [ 4543.035775][ T7718] usb 1-1: USB disconnect, device number 18 [ 4543.097020][ T7718] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 4543.770857][ T7718] cp210x 1-1:0.0: device disconnected [ 4547.714278][ T29] kauditd_printk_skb: 1839 callbacks suppressed [ 4547.714451][ T29] audit: type=1400 audit(4547.154:156827): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="block" dev="sysfs" ino=11411 [ 4547.717242][ T29] audit: type=1400 audit(4547.154:156828): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="loop3" dev="sysfs" ino=13377 [ 4547.719094][ T29] audit: type=1400 audit(4547.154:156829): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/sys/devices/virtual/block/loop3/uevent" dev="sysfs" ino=13378 [ 4547.771335][ T29] audit: type=1400 audit(4547.174:156830): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21943 comm="syz-executor" name="128" dev="tmpfs" ino=672 [ 4547.788726][ T29] audit: type=1400 audit(4547.174:156831): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21943 comm="syz-executor" name="128" dev="tmpfs" ino=672 [ 4547.790487][ T29] audit: type=1400 audit(4547.194:156832): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4547.792355][ T29] audit: type=1400 audit(4547.194:156833): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="sysfs" ino=1 [ 4547.836703][ T29] audit: type=1400 audit(4547.194:156834): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="devices" dev="sysfs" ino=7 [ 4547.838649][ T29] audit: type=1400 audit(4547.194:156835): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="virtual" dev="sysfs" ino=813 [ 4547.840409][ T29] audit: type=1400 audit(4547.194:156836): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="block" dev="sysfs" ino=11411 [ 4552.987514][ T29] kauditd_printk_skb: 4362 callbacks suppressed [ 4552.987700][ T29] audit: type=1400 audit(4552.414:158338): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21875 comm="udevd" name="dev" dev="sysfs" ino=8 [ 4552.990373][ T29] audit: type=1400 audit(4552.414:158339): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21875 comm="udevd" name="/" dev="sysfs" ino=1 [ 4553.012357][ T29] audit: type=1400 audit(4552.424:158340): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21875 comm="udevd" name="devices" dev="sysfs" ino=7 [ 4554.008035][ T29] audit: type=1400 audit(4552.424:158341): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21875 comm="udevd" name="virtual" dev="sysfs" ino=813 [ 4554.009009][ T29] audit: type=1400 audit(4552.424:158342): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21875 comm="udevd" name="block" dev="sysfs" ino=11411 [ 4554.009827][ T29] audit: type=1400 audit(4552.424:158343): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=21875 comm="udevd" name="loop3" dev="sysfs" ino=13377 [ 4554.010664][ T29] audit: type=1400 audit(4552.424:158344): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21875 comm="udevd" path="/sys/devices/virtual/block/loop3" dev="sysfs" ino=13377 [ 4554.011522][ T29] audit: type=1400 audit(4552.424:158345): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21875 comm="udevd" name="loop3" dev="sysfs" ino=13377 [ 4554.012337][ T29] audit: type=1400 audit(4552.424:158346): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=r pid=21875 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=640 [ 4554.013177][ T29] audit: type=1400 audit(4552.424:158347): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=21875 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=640 [ 4555.859297][T21960] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4555.861367][T21960] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4558.335825][ T29] kauditd_printk_skb: 2177 callbacks suppressed [ 4558.335939][ T29] audit: type=1400 audit(4556.753:160330): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wx pid=21874 comm="udevd" name="data" dev="tmpfs" ino=11 [ 4558.337905][ T29] audit: type=1400 audit(4557.453:160331): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21963 comm="syz.3.6377" name="newroot" dev="tmpfs" ino=2 [ 4558.339364][ T29] audit: type=1400 audit(4557.463:160332): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21963 comm="syz.3.6377" name="/" dev="devtmpfs" ino=1 [ 4558.341060][ T29] audit: type=1400 audit(4557.463:160333): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=w pid=21963 comm="syz.3.6377" name="amidi2" dev="devtmpfs" ino=739 [ 4558.342922][ T29] audit: type=1400 audit(4557.463:160334): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21963 comm="syz.3.6377" path="/dev/amidi2" dev="devtmpfs" ino=739 [ 4558.349662][ T29] audit: type=1400 audit(4557.473:160335): lsm=SMACK fn=smack_file_ioctl action=granted subject="_" object="_" requested=w pid=21963 comm="syz.3.6377" path="/dev/amidi2" dev="devtmpfs" ino=739 [ 4558.352712][ T29] audit: type=1400 audit(4557.493:160336): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21963 comm="syz.3.6377" name="newroot" dev="tmpfs" ino=2 [ 4558.365660][ T29] audit: type=1400 audit(4557.493:160337): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21963 comm="syz.3.6377" name="/" dev="proc" ino=1 [ 4558.367652][ T29] audit: type=1400 audit(4557.493:160338): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21963 comm="syz.3.6377" name="/" dev="proc" ino=1 [ 4558.369908][ T29] audit: type=1400 audit(4557.503:160339): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21963 comm="syz.3.6377" name="380" dev="proc" ino=67469 [ 4564.062691][ T29] kauditd_printk_skb: 263 callbacks suppressed [ 4564.063136][ T29] audit: type=1400 audit(4563.333:160603): lsm=SMACK fn=smack_task_setscheduler action=granted subject="_" object="_" requested=w pid=21972 comm="syz.0.6380" opid=21972 ocomm="syz.0.6380" [ 4564.095176][ T29] audit: type=1400 audit(4563.413:160604): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21972 comm="syz.0.6380" name="newroot" dev="tmpfs" ino=2 [ 4564.108939][ T29] audit: type=1400 audit(4563.413:160605): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21972 comm="syz.0.6380" name="/" dev="devtmpfs" ino=1 [ 4564.130385][ T29] audit: type=1400 audit(4563.423:160606): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=21972 comm="syz.0.6380" name="fb0" dev="devtmpfs" ino=619 [ 4564.153267][ T29] audit: type=1400 audit(4563.423:160607): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21972 comm="syz.0.6380" path="/dev/fb0" dev="devtmpfs" ino=619 [ 4564.198932][ T29] audit: type=1400 audit(4563.583:160608): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4564.259551][ T29] audit: type=1400 audit(4563.583:160609): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4564.291649][ T29] audit: type=1400 audit(4563.603:160610): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4564.296069][ T29] audit: type=1400 audit(4563.633:160611): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4564.320358][ T29] audit: type=1400 audit(4563.653:160612): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4571.059221][ T29] kauditd_printk_skb: 108 callbacks suppressed [ 4571.059439][ T29] audit: type=1400 audit(4570.503:160721): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=21035 comm="syz-executor" opid=21963 ocomm="syz.3.6377" [ 4571.070637][ T29] audit: type=1400 audit(4570.513:160722): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4571.075388][ T29] audit: type=1400 audit(4570.513:160723): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4571.085214][ T29] audit: type=1400 audit(4570.513:160724): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4571.087265][ T29] audit: type=1400 audit(4570.523:160725): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4571.089052][ T29] audit: type=1400 audit(4570.523:160726): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4571.090596][ T29] audit: type=1400 audit(4570.523:160727): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4571.092126][ T29] audit: type=1400 audit(4570.523:160728): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4571.110690][ T29] audit: type=1400 audit(4570.543:160729): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4571.296933][ T29] audit: type=1400 audit(4570.543:160730): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=21035 comm="syz-executor" opid=21963 ocomm="syz.3.6377" [ 4572.969143][T21984] binder: 21983:21984 tried to acquire reference to desc 0, got 1 instead [ 4572.983736][T21984] binder: cannot allocate buffer: no space left [ 4573.001609][T21984] binder: 21983:21984 transaction async to 21983:0 failed 82/29201/-28, size 0--514 line 3333 [ 4573.028756][T17904] binder: undelivered TRANSACTION_ERROR: 29201 [ 4576.186343][ T29] kauditd_printk_skb: 3194 callbacks suppressed [ 4576.190040][ T29] audit: type=1400 audit(4575.562:162348): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21995 comm="kworker/u8:8" name="/" dev="vda" ino=2 [ 4576.257820][ T29] audit: type=1400 audit(4575.652:162349): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21995 comm="kworker/u8:8" name="sbin" dev="vda" ino=1428 [ 4576.286661][ T29] audit: type=1400 audit(4575.692:162350): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4576.400617][ T29] audit: type=1400 audit(4575.692:162351): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4576.516575][ T29] audit: type=1400 audit(4575.692:162352): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21995 comm="kworker/u8:8" name="modprobe" dev="vda" ino=1462 [ 4576.614331][ T29] audit: type=1400 audit(4575.692:162353): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4576.676421][ T29] audit: type=1400 audit(4575.692:162355): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4576.713189][ T29] audit: type=1400 audit(4575.692:162354): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=21995 comm="kworker/u8:8" path="/sbin/modprobe" dev="vda" ino=1462 [ 4576.755973][ T29] audit: type=1400 audit(4575.692:162356): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4576.873562][ T29] audit: type=1400 audit(4575.692:162357): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4581.195710][ T29] kauditd_printk_skb: 2405 callbacks suppressed [ 4581.195895][ T29] audit: type=1400 audit(4580.632:164310): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=7718 comm="kworker/1:5" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=49696 netif=lo [ 4581.198375][ T29] audit: type=1400 audit(4580.632:164311): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=7718 comm="kworker/1:5" saddr=127.0.0.1 src=49696 daddr=127.0.0.1 dest=30006 netif=lo [ 4581.200070][ T29] audit: type=1400 audit(4580.632:164312): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=7718 comm="kworker/1:5" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=49696 netif=lo [ 4581.201428][ T29] audit: type=1400 audit(4580.632:164313): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22011 comm="syz-executor" name="502" dev="tmpfs" ino=2665 [ 4581.202589][ T29] audit: type=1400 audit(4580.632:164314): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22011 comm="syz-executor" name="502" dev="tmpfs" ino=2665 [ 4581.203627][ T29] audit: type=1400 audit(4580.642:164315): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21035 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4581.248698][T21035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4581.249620][ T29] audit: type=1400 audit(4580.642:164316): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21035 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4581.251185][T21035] audit: audit_lost=23374 audit_rate_limit=0 audit_backlog_limit=64 [ 4581.251953][ T29] audit: type=1400 audit(4580.642:164317): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21035 comm="syz-executor" name="137" dev="tmpfs" ino=717 [ 4586.214440][ T29] kauditd_printk_skb: 2213 callbacks suppressed [ 4586.214591][ T29] audit: type=1400 audit(4585.642:165162): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22022 comm="modprobe" name="modules" dev="vda" ino=384 [ 4586.217532][ T29] audit: type=1400 audit(4585.652:165163): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22022 comm="modprobe" name="modules" dev="vda" ino=384 [ 4586.225641][ T29] audit: type=1400 audit(4585.662:165164): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4586.226885][ T29] audit: type=1400 audit(4585.662:165165): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4586.228687][ T29] audit: type=1400 audit(4585.662:165166): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4586.239829][ T29] audit: type=1400 audit(4585.662:165167): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4586.240857][ T29] audit: type=1400 audit(4585.662:165168): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4586.251042][ T29] audit: type=1400 audit(4585.662:165169): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4586.252072][ T29] audit: type=1400 audit(4585.662:165170): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4586.266218][ T29] audit: type=1400 audit(4585.682:165171): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4588.797210][T22031] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 4591.492223][ T29] kauditd_printk_skb: 1934 callbacks suppressed [ 4591.492404][ T29] audit: type=1400 audit(4589.912:165618): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/etc/udev/rules.d" dev="vda" ino=193 [ 4591.494933][ T29] audit: type=1400 audit(4590.932:165619): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4591.517492][ T29] audit: type=1400 audit(4590.932:165620): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="lib" dev="vda" ino=195 [ 4592.931723][ T29] audit: type=1400 audit(4590.932:165621): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="udev" dev="vda" ino=1390 [ 4592.933717][ T29] audit: type=1400 audit(4591.362:165622): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/lib/udev/rules.d" dev="vda" ino=1395 [ 4592.943524][ T29] audit: type=1400 audit(4591.362:165623): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4593.327277][ T29] audit: type=1400 audit(4591.362:165624): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="tmpfs" ino=1 [ 4593.347351][ T29] audit: type=1400 audit(4591.362:165625): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="udev" dev="tmpfs" ino=7 [ 4593.349424][ T29] audit: type=1400 audit(4591.362:165626): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/run/udev/rules.d" dev="tmpfs" ino=9 [ 4593.351333][ T29] audit: type=1400 audit(4591.362:165627): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4596.509107][ T29] kauditd_printk_skb: 1491 callbacks suppressed [ 4596.672783][ T29] audit: type=1400 audit(4595.822:166969): lsm=SMACK fn=smack_inode_getxattr action=granted subject="_" object="*" requested=r pid=22037 comm="syz.3.6397" name="UNIX" dev="sockfs" ino=68637 [ 4596.690222][ T29] audit: type=1400 audit(4595.862:166970): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4596.771711][ T29] audit: type=1400 audit(4596.182:166971): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4596.773610][ T29] audit: type=1400 audit(4596.212:166972): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22045 comm="syz.0.6398" name="newroot" dev="tmpfs" ino=2 [ 4596.805109][ T29] audit: type=1400 audit(4596.212:166973): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22045 comm="syz.0.6398" name="/" dev="proc" ino=1 [ 4596.812058][ T29] audit: type=1400 audit(4596.212:166974): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22045 comm="syz.0.6398" name="/" dev="proc" ino=1 [ 4596.814895][ T29] audit: type=1400 audit(4596.212:166975): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22045 comm="syz.0.6398" name="1306" dev="proc" ino=68419 [ 4597.214765][ T29] audit: type=1400 audit(4596.212:166976): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22045 comm="syz.0.6398" name="ns" dev="proc" ino=68641 [ 4597.237219][ T29] audit: type=1400 audit(4596.212:166977): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=22045 comm="syz.0.6398" dev="nsfs" ino=4026532675 [ 4597.266725][ T29] audit: type=1400 audit(4596.212:166978): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=22045 comm="syz.0.6398" path="net:[4026532675]" dev="nsfs" ino=4026532675 [ 4599.817027][ T9116] usb 1-1: new full-speed USB device number 19 using dummy_hcd [ 4600.088379][ T9116] usb 1-1: unable to get BOS descriptor or descriptor too short [ 4600.340814][ T9116] usb 1-1: not running at top speed; connect to a high speed hub [ 4601.047493][ T9116] usb 1-1: config 15 has an invalid interface number: 19 but max is 0 [ 4601.050333][ T9116] usb 1-1: config 15 has no interface number 0 [ 4601.051807][ T9116] usb 1-1: config 15 interface 19 altsetting 2 endpoint 0x8 has invalid maxpacket 1023, setting to 64 [ 4601.055133][ T9116] usb 1-1: config 15 interface 19 has no altsetting 0 [ 4601.083232][ T9116] usb 1-1: string descriptor 0 read error: -22 [ 4601.084478][ T9116] usb 1-1: New USB device found, idVendor=2058, idProduct=1005, bcdDevice=f1.d7 [ 4601.085055][ T9116] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4601.321070][T21609] usb 1-1: USB disconnect, device number 19 [ 4601.520226][ T29] kauditd_printk_skb: 2181 callbacks suppressed [ 4601.520325][ T29] audit: type=1400 audit(4600.961:169088): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4601.523123][ T29] audit: type=1400 audit(4600.961:169089): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="sysfs" ino=1 [ 4601.525439][ T29] audit: type=1400 audit(4600.961:169090): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="devices" dev="sysfs" ino=7 [ 4601.536244][ T29] audit: type=1400 audit(4600.971:169091): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="virtual" dev="sysfs" ino=813 [ 4601.537501][ T29] audit: type=1400 audit(4600.971:169092): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="block" dev="sysfs" ino=11411 [ 4601.538624][ T29] audit: type=1400 audit(4600.971:169093): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4601.540026][ T29] audit: type=1400 audit(4600.971:169094): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="sysfs" ino=1 [ 4601.541369][ T29] audit: type=1400 audit(4600.971:169095): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="devices" dev="sysfs" ino=7 [ 4601.542386][ T29] audit: type=1400 audit(4600.971:169096): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22070 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4601.572603][ T29] audit: type=1400 audit(4600.971:169097): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="virtual" dev="sysfs" ino=813 [ 4606.567432][ T29] kauditd_printk_skb: 496 callbacks suppressed [ 4606.575196][ T29] audit: type=1400 audit(4605.841:169593): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22064 comm="udevd" name="/" dev="sysfs" ino=1 [ 4606.856464][ T29] audit: type=1400 audit(4605.861:169594): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22062 comm="udevd" name="/" dev="sysfs" ino=1 [ 4606.858654][ T29] audit: type=1400 audit(4606.261:169597): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22062 comm="udevd" name="devices" dev="sysfs" ino=7 [ 4606.860545][ T29] audit: type=1400 audit(4606.261:169598): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22062 comm="udevd" name="virtual" dev="sysfs" ino=813 [ 4606.924933][ T29] audit: type=1400 audit(4606.261:169599): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22062 comm="udevd" name="block" dev="sysfs" ino=11411 [ 4606.941374][ T29] audit: type=1400 audit(4606.261:169600): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22062 comm="udevd" name="loop3" dev="sysfs" ino=13377 [ 4606.943793][ T29] audit: type=1400 audit(4605.941:169596): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21035 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4606.964286][ T29] audit: type=1400 audit(4606.281:169601): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21035 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4606.977622][ T29] audit: type=1400 audit(4606.281:169602): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21035 comm="syz-executor" name="142" dev="tmpfs" ino=742 [ 4606.979771][ T29] audit: type=1400 audit(4606.281:169603): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=21035 comm="syz-executor" path="/142/cgroup.cpu" dev="tmpfs" ino=744 [ 4611.590648][ T29] kauditd_printk_skb: 532 callbacks suppressed [ 4611.590811][ T29] audit: type=1400 audit(4611.031:170136): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4611.630506][ T29] audit: type=1400 audit(4611.051:170137): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4611.632793][ T29] audit: type=1400 audit(4611.061:170138): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4611.635181][ T29] audit: type=1400 audit(4611.061:170139): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4611.738006][ T29] audit: type=1400 audit(4611.061:170140): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4611.740198][ T29] audit: type=1400 audit(4611.061:170141): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4611.741823][ T29] audit: type=1400 audit(4611.061:170142): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4611.743991][ T29] audit: type=1400 audit(4611.061:170143): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4611.745676][ T29] audit: type=1400 audit(4611.081:170144): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="etc" dev="vda" ino=95 [ 4611.751021][ T29] audit: type=1400 audit(4611.081:170145): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="udev" dev="vda" ino=191 [ 4617.826176][ T29] kauditd_printk_skb: 1217 callbacks suppressed [ 4617.828361][ T29] audit: type=1400 audit(4617.261:171363): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3089 comm="udevd" opid=22087 ocomm="udevd" [ 4617.839122][ T29] audit: type=1400 audit(4617.281:171364): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4617.847724][ T29] audit: type=1400 audit(4617.281:171365): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4617.850482][ T29] audit: type=1400 audit(4617.281:171366): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="etc" dev="vda" ino=95 [ 4617.852353][ T29] audit: type=1400 audit(4617.281:171367): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4617.854399][ T29] audit: type=1400 audit(4617.281:171368): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="udev" dev="vda" ino=191 [ 4617.867778][ T29] audit: type=1400 audit(4617.281:171369): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4617.870044][ T29] audit: type=1400 audit(4617.281:171371): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4617.872433][ T29] audit: type=1400 audit(4617.281:171370): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/etc/udev/rules.d" dev="vda" ino=193 [ 4617.874202][ T29] audit: type=1400 audit(4617.281:171372): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4622.158897][T22129] usb usb1: usbfs: process 22129 (syz.3.6430) did not claim interface 0 before use [ 4622.827842][ T29] kauditd_printk_skb: 3827 callbacks suppressed [ 4622.828012][ T29] audit: type=1400 audit(4622.260:175200): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3261 comm="sshd" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=49696 netif=lo [ 4622.831155][ T29] audit: type=1400 audit(4622.260:175201): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3261 comm="sshd" saddr=127.0.0.1 src=49696 daddr=127.0.0.1 dest=30006 netif=lo [ 4622.833142][ T29] audit: type=1400 audit(4622.260:175202): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="sysfs" ino=1 [ 4622.835411][ T29] audit: type=1400 audit(4622.260:175203): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="devices" dev="sysfs" ino=7 [ 4622.863542][ T29] audit: type=1400 audit(4622.260:175204): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="virtual" dev="sysfs" ino=813 [ 4622.865569][ T29] audit: type=1400 audit(4622.260:175205): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="block" dev="sysfs" ino=11411 [ 4622.878325][ T29] audit: type=1400 audit(4622.260:175206): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="loop3" dev="sysfs" ino=13377 [ 4622.880203][ T29] audit: type=1400 audit(4622.270:175207): lsm=SMACK fn=smack_inode_unlink action=granted subject="_" object="_" requested=w pid=21035 comm="syz-executor" name="152" dev="tmpfs" ino=792 [ 4622.883744][ T29] audit: type=1400 audit(4622.270:175208): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=21035 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4622.896522][ T3089] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4627.852110][ T29] kauditd_printk_skb: 4449 callbacks suppressed [ 4627.852292][ T29] audit: type=1400 audit(4627.270:178499): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=22164 comm="syz-executor" name="156" dev="tmpfs" ino=813 [ 4627.854956][ T29] audit: type=1400 audit(4627.290:178500): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4627.900861][ T29] audit: type=1400 audit(4627.310:178501): lsm=SMACK fn=smack_task_setpgid action=granted subject="_" object="_" requested=w pid=22164 comm="syz-executor" opid=22164 ocomm="syz-executor" [ 4627.903080][ T29] audit: type=1400 audit(4627.310:178502): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="devtmpfs" ino=1 [ 4627.904915][ T29] audit: type=1400 audit(4627.310:178503): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" name="loop3" dev="devtmpfs" ino=640 [ 4627.948496][ T29] audit: type=1400 audit(4627.310:178504): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=640 [ 4627.960555][ T29] audit: type=1400 audit(4627.310:178505): lsm=SMACK fn=smack_file_lock action=granted subject="_" object="_" requested=l pid=3089 comm="udevd" path="/dev/loop3" dev="devtmpfs" ino=640 [ 4627.964122][ T29] audit: type=1400 audit(4627.310:178507): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4627.965999][ T29] audit: type=1400 audit(4627.310:178508): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4627.992295][ T29] audit: type=1400 audit(4627.310:178509): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4633.122943][ T29] kauditd_printk_skb: 555 callbacks suppressed [ 4633.123136][ T29] audit: type=1400 audit(4632.560:179037): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17685 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4633.128190][ T29] audit: type=1400 audit(4632.560:179038): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17685 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4633.142777][ T29] audit: type=1400 audit(4632.580:179039): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17685 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4633.144661][ T29] audit: type=1400 audit(4632.580:179040): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=17685 comm="syz-executor" name="newroot" dev="tmpfs" ino=2 [ 4633.146757][ T29] audit: type=1400 audit(4632.580:179041): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=r pid=17685 comm="syz-executor" name="538" dev="tmpfs" ino=2849 [ 4633.156039][ T29] audit: type=1400 audit(4632.580:179042): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=17685 comm="syz-executor" path="/538" dev="tmpfs" ino=2849 [ 4633.176094][ T29] audit: type=1400 audit(4632.580:179043): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=17685 comm="syz-executor" path="/538" dev="tmpfs" ino=2849 [ 4633.335623][ T29] audit: type=1400 audit(4632.580:179044): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3263 comm="syz-executor" saddr=127.0.0.1 src=49696 daddr=127.0.0.1 dest=30006 netif=lo [ 4633.514364][ T29] audit: type=1400 audit(4632.580:179045): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3263 comm="syz-executor" saddr=127.0.0.1 src=30006 daddr=127.0.0.1 dest=49696 netif=lo [ 4633.594664][ T29] audit: type=1400 audit(4632.590:179046): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=3263 comm="syz-executor" saddr=127.0.0.1 src=49696 daddr=127.0.0.1 dest=30006 netif=lo [ 4634.818149][T22173] netlink: 68 bytes leftover after parsing attributes in process `syz.0.6447'. [ 4635.592304][T22177] sctp: [Deprecated]: syz.0.6449 (pid 22177) Use of struct sctp_assoc_value in delayed_ack socket option. [ 4635.592304][T22177] Use struct sctp_sack_info instead [ 4640.243343][ T29] kauditd_printk_skb: 1024 callbacks suppressed [ 4640.243555][ T29] audit: type=1400 audit(4639.690:180071): lsm=SMACK fn=smack_task_kill action=granted subject="_" object="_" requested=w pid=3089 comm="udevd" opid=22178 ocomm="udevd" [ 4640.246092][ T29] audit: type=1400 audit(4639.690:180072): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4640.261375][ T29] audit: type=1400 audit(4639.690:180073): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="etc" dev="vda" ino=95 [ 4640.263246][ T29] audit: type=1400 audit(4639.690:180074): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="udev" dev="vda" ino=191 [ 4640.265109][ T29] audit: type=1400 audit(4639.690:180075): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/etc/udev/rules.d" dev="vda" ino=193 [ 4640.266857][ T29] audit: type=1400 audit(4639.690:180076): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4640.291032][ T29] audit: type=1400 audit(4639.700:180077): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="lib" dev="vda" ino=195 [ 4640.293657][ T29] audit: type=1400 audit(4639.700:180078): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="udev" dev="vda" ino=1390 [ 4640.295393][ T29] audit: type=1400 audit(4639.700:180079): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3089 comm="udevd" path="/lib/udev/rules.d" dev="vda" ino=1395 [ 4640.300972][ T29] audit: type=1400 audit(4639.700:180080): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3089 comm="udevd" name="/" dev="vda" ino=2 [ 4654.322307][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 4654.322603][ T29] audit: type=1400 audit(4653.769:180119): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4654.325715][ T29] audit: type=1400 audit(4653.769:180120): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4654.327761][ T29] audit: type=1400 audit(4653.769:180121): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4654.336011][ T29] audit: type=1400 audit(4653.779:180122): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4654.344164][ T29] audit: type=1400 audit(4653.779:180123): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4654.345743][ T29] audit: type=1400 audit(4653.779:180124): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4654.347512][ T29] audit: type=1400 audit(4653.779:180125): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4654.351148][ T29] audit: type=1400 audit(4653.779:180126): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4654.352830][ T29] audit: type=1400 audit(4653.789:180127): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4654.354513][ T29] audit: type=1400 audit(4653.789:180128): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4660.887346][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4660.887551][ T29] audit: type=1400 audit(4660.329:180130): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4660.893928][ T29] audit: type=1400 audit(4660.339:180131): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4660.895576][ T29] audit: type=1400 audit(4660.339:180132): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4660.897094][ T29] audit: type=1400 audit(4660.339:180133): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4660.903255][ T29] audit: type=1400 audit(4660.339:180134): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4660.905259][ T29] audit: type=1400 audit(4660.339:180135): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4660.907141][ T29] audit: type=1400 audit(4660.339:180136): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4660.910270][ T29] audit: type=1400 audit(4660.339:180137): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4660.911675][ T29] audit: type=1400 audit(4660.339:180138): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4660.912959][ T29] audit: type=1400 audit(4660.339:180139): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4677.540673][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4677.540891][ T29] audit: type=1400 audit(4676.988:180141): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4677.544710][ T29] audit: type=1400 audit(4676.988:180142): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4677.546752][ T29] audit: type=1400 audit(4676.988:180143): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4677.561094][ T29] audit: type=1400 audit(4676.998:180144): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4677.563300][ T29] audit: type=1400 audit(4676.998:180145): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4677.565201][ T29] audit: type=1400 audit(4676.998:180146): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4677.567199][ T29] audit: type=1400 audit(4676.998:180147): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4677.573662][ T29] audit: type=1400 audit(4676.998:180148): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4677.576332][ T29] audit: type=1400 audit(4676.998:180149): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4677.578250][ T29] audit: type=1400 audit(4676.998:180150): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4695.645165][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 4695.645388][ T29] audit: type=1400 audit(4695.087:180163): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4695.649311][ T29] audit: type=1400 audit(4695.087:180164): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4695.657421][ T29] audit: type=1400 audit(4695.097:180165): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4695.667093][ T29] audit: type=1400 audit(4695.107:180166): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4695.674188][ T29] audit: type=1400 audit(4695.107:180167): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4695.679186][ T29] audit: type=1400 audit(4695.107:180168): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4695.689550][ T29] audit: type=1400 audit(4695.117:180169): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4695.694534][ T29] audit: type=1400 audit(4695.117:180170): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4695.699245][ T29] audit: type=1400 audit(4695.117:180171): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4695.705678][ T29] audit: type=1400 audit(4695.117:180172): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4706.705587][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4706.705844][ T29] audit: type=1400 audit(4706.147:180174): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4706.723652][ T29] audit: type=1400 audit(4706.167:180175): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4706.741112][ T29] audit: type=1400 audit(4706.167:180176): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4706.743064][ T29] audit: type=1400 audit(4706.167:180177): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4706.745105][ T29] audit: type=1400 audit(4706.177:180178): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4706.747339][ T29] audit: type=1400 audit(4706.177:180179): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4706.749127][ T29] audit: type=1400 audit(4706.177:180180): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4706.753000][ T29] audit: type=1400 audit(4706.177:180181): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4706.755292][ T29] audit: type=1400 audit(4706.177:180182): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4706.757489][ T29] audit: type=1400 audit(4706.177:180183): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4718.124253][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 4718.124425][ T29] audit: type=1400 audit(4717.566:180188): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4718.129988][ T29] audit: type=1400 audit(4717.566:180189): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4718.133086][ T29] audit: type=1400 audit(4717.566:180190): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4718.144764][ T29] audit: type=1400 audit(4717.586:180191): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4718.146834][ T29] audit: type=1400 audit(4717.586:180192): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4718.148522][ T29] audit: type=1400 audit(4717.586:180193): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4718.150233][ T29] audit: type=1400 audit(4717.586:180194): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4718.157036][ T29] audit: type=1400 audit(4717.586:180195): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4718.159164][ T29] audit: type=1400 audit(4717.586:180196): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4718.162598][ T29] audit: type=1400 audit(4717.586:180197): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4724.684800][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4724.684978][ T29] audit: type=1400 audit(4724.126:180199): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4724.688652][ T29] audit: type=1400 audit(4724.126:180200): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4724.690608][ T29] audit: type=1400 audit(4724.126:180201): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4724.698586][ T29] audit: type=1400 audit(4724.136:180202): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4724.700524][ T29] audit: type=1400 audit(4724.136:180203): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4724.707011][ T29] audit: type=1400 audit(4724.136:180204): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4724.709117][ T29] audit: type=1400 audit(4724.136:180205): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4724.718388][ T29] audit: type=1400 audit(4724.136:180206): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4724.720665][ T29] audit: type=1400 audit(4724.146:180207): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4724.723806][ T29] audit: type=1400 audit(4724.146:180208): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4741.755678][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4741.755867][ T29] audit: type=1400 audit(4741.195:180210): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4741.766049][ T29] audit: type=1400 audit(4741.195:180211): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4741.768121][ T29] audit: type=1400 audit(4741.205:180212): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4741.781386][ T29] audit: type=1400 audit(4741.215:180213): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4741.785117][ T29] audit: type=1400 audit(4741.215:180214): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4741.787238][ T29] audit: type=1400 audit(4741.215:180215): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4741.789094][ T29] audit: type=1400 audit(4741.215:180216): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4741.793071][ T29] audit: type=1400 audit(4741.215:180217): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4741.795418][ T29] audit: type=1400 audit(4741.215:180218): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4741.798092][ T29] audit: type=1400 audit(4741.225:180219): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4760.275416][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 4760.275589][ T29] audit: type=1400 audit(4759.714:180224): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4760.278712][ T29] audit: type=1400 audit(4759.714:180225): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4760.280332][ T29] audit: type=1400 audit(4759.714:180226): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4760.287665][ T29] audit: type=1400 audit(4759.724:180227): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4760.290066][ T29] audit: type=1400 audit(4759.724:180228): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4760.291990][ T29] audit: type=1400 audit(4759.724:180229): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4760.300453][ T29] audit: type=1400 audit(4759.724:180230): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4760.302351][ T29] audit: type=1400 audit(4759.724:180231): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4760.304892][ T29] audit: type=1400 audit(4759.724:180232): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4760.306893][ T29] audit: type=1400 audit(4759.724:180233): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4770.498499][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4770.498723][ T29] audit: type=1400 audit(4769.934:180235): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4770.507683][ T29] audit: type=1400 audit(4769.944:180236): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4770.509448][ T29] audit: type=1400 audit(4769.944:180237): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4770.510829][ T29] audit: type=1400 audit(4769.944:180238): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4770.512629][ T29] audit: type=1400 audit(4769.944:180239): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4770.517174][ T29] audit: type=1400 audit(4769.944:180240): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4770.519405][ T29] audit: type=1400 audit(4769.944:180241): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4770.521161][ T29] audit: type=1400 audit(4769.944:180242): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4770.524291][ T29] audit: type=1400 audit(4769.944:180243): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4770.526273][ T29] audit: type=1400 audit(4769.944:180244): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4781.177865][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 4781.178168][ T29] audit: type=1400 audit(4780.613:180249): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4781.181754][ T29] audit: type=1400 audit(4780.613:180250): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4781.188097][ T29] audit: type=1400 audit(4780.613:180251): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4781.194422][ T29] audit: type=1400 audit(4780.623:180252): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4781.196540][ T29] audit: type=1400 audit(4780.623:180253): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4781.198415][ T29] audit: type=1400 audit(4780.623:180254): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4781.200306][ T29] audit: type=1400 audit(4780.633:180255): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4781.202170][ T29] audit: type=1400 audit(4780.633:180256): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4781.208932][ T29] audit: type=1400 audit(4780.633:180257): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4781.219592][ T29] audit: type=1400 audit(4780.633:180258): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4788.495943][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4788.496118][ T29] audit: type=1400 audit(4787.933:180260): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4788.502765][ T29] audit: type=1400 audit(4787.933:180261): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4788.505966][ T29] audit: type=1400 audit(4787.933:180262): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4788.515032][ T29] audit: type=1400 audit(4787.943:180263): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4788.519299][ T29] audit: type=1400 audit(4787.943:180264): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4788.521176][ T29] audit: type=1400 audit(4787.953:180265): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4788.523012][ T29] audit: type=1400 audit(4787.953:180266): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4788.529278][ T29] audit: type=1400 audit(4787.953:180267): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4788.531875][ T29] audit: type=1400 audit(4787.953:180268): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4788.533824][ T29] audit: type=1400 audit(4787.953:180269): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4806.378167][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4806.378289][ T29] audit: type=1400 audit(4805.812:180271): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4806.382135][ T29] audit: type=1400 audit(4805.812:180272): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4806.391086][ T29] audit: type=1400 audit(4805.822:180273): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4806.401224][ T29] audit: type=1400 audit(4805.822:180274): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4806.403078][ T29] audit: type=1400 audit(4805.832:180275): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4806.405943][ T29] audit: type=1400 audit(4805.832:180276): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4806.407947][ T29] audit: type=1400 audit(4805.832:180277): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4806.409800][ T29] audit: type=1400 audit(4805.832:180278): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4806.411574][ T29] audit: type=1400 audit(4805.832:180279): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4806.413407][ T29] audit: type=1400 audit(4805.832:180280): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4824.579204][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 4824.579500][ T29] audit: type=1400 audit(4824.012:180285): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4824.582576][ T29] audit: type=1400 audit(4824.012:180286): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4824.591834][ T29] audit: type=1400 audit(4824.012:180287): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4824.593487][ T29] audit: type=1400 audit(4824.022:180288): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4824.595150][ T29] audit: type=1400 audit(4824.022:180289): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4824.600500][ T29] audit: type=1400 audit(4824.022:180290): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4824.601367][ T29] audit: type=1400 audit(4824.032:180291): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4824.602177][ T29] audit: type=1400 audit(4824.032:180292): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4824.603075][ T29] audit: type=1400 audit(4824.032:180293): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4824.603901][ T29] audit: type=1400 audit(4824.032:180294): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4834.728724][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4834.728941][ T29] audit: type=1400 audit(4834.161:180296): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4834.731717][ T29] audit: type=1400 audit(4834.161:180297): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4834.733874][ T29] audit: type=1400 audit(4834.161:180298): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4834.740473][ T29] audit: type=1400 audit(4834.171:180299): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4834.742118][ T29] audit: type=1400 audit(4834.171:180300): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4834.743608][ T29] audit: type=1400 audit(4834.171:180301): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4834.744570][ T29] audit: type=1400 audit(4834.171:180302): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4834.745569][ T29] audit: type=1400 audit(4834.171:180303): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4834.750084][ T29] audit: type=1400 audit(4834.171:180304): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4834.751764][ T29] audit: type=1400 audit(4834.171:180305): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4844.766919][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 4844.767113][ T29] audit: type=1400 audit(4844.191:180310): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4844.774678][ T29] audit: type=1400 audit(4844.201:180311): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4844.782312][ T29] audit: type=1400 audit(4844.221:180312): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4844.784111][ T29] audit: type=1400 audit(4844.221:180313): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4844.785880][ T29] audit: type=1400 audit(4844.221:180314): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4844.791015][ T29] audit: type=1400 audit(4844.221:180315): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4844.792017][ T29] audit: type=1400 audit(4844.221:180316): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4844.792982][ T29] audit: type=1400 audit(4844.221:180317): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4844.793888][ T29] audit: type=1400 audit(4844.221:180318): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4844.794947][ T29] audit: type=1400 audit(4844.221:180319): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4853.201537][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4853.201708][ T29] audit: type=1400 audit(4852.640:180321): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4853.208147][ T29] audit: type=1400 audit(4852.640:180322): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4853.211171][ T29] audit: type=1400 audit(4852.640:180323): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4853.219574][ T29] audit: type=1400 audit(4852.650:180324): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4853.221643][ T29] audit: type=1400 audit(4852.650:180325): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4853.223749][ T29] audit: type=1400 audit(4852.650:180326): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4853.225658][ T29] audit: type=1400 audit(4852.650:180327): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4853.230009][ T29] audit: type=1400 audit(4852.650:180328): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4853.231991][ T29] audit: type=1400 audit(4852.650:180329): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4853.234670][ T29] audit: type=1400 audit(4852.650:180330): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4869.442325][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4869.442647][ T29] audit: type=1400 audit(4868.880:180332): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4869.446976][ T29] audit: type=1400 audit(4868.880:180333): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4869.452623][ T29] audit: type=1400 audit(4868.890:180334): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4869.459673][ T29] audit: type=1400 audit(4868.900:180335): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4869.463935][ T29] audit: type=1400 audit(4868.900:180336): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4869.465423][ T29] audit: type=1400 audit(4868.900:180337): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4869.466773][ T29] audit: type=1400 audit(4868.900:180338): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4869.473469][ T29] audit: type=1400 audit(4868.900:180339): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4869.475610][ T29] audit: type=1400 audit(4868.900:180340): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4869.482322][ T29] audit: type=1400 audit(4868.920:180341): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4888.632064][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 4888.632247][ T29] audit: type=1400 audit(4888.069:180346): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4888.635258][ T29] audit: type=1400 audit(4888.069:180347): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4888.642403][ T29] audit: type=1400 audit(4888.069:180348): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4888.644187][ T29] audit: type=1400 audit(4888.079:180349): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4888.645874][ T29] audit: type=1400 audit(4888.079:180350): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4888.647469][ T29] audit: type=1400 audit(4888.079:180351): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4888.654295][ T29] audit: type=1400 audit(4888.079:180352): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4888.656480][ T29] audit: type=1400 audit(4888.079:180353): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4888.667878][ T29] audit: type=1400 audit(4888.079:180354): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4888.671060][ T29] audit: type=1400 audit(4888.079:180355): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4898.106223][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4898.106412][ T29] audit: type=1400 audit(4897.539:180357): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4898.115313][ T29] audit: type=1400 audit(4897.539:180358): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4898.117722][ T29] audit: type=1400 audit(4897.549:180359): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4898.125693][ T29] audit: type=1400 audit(4897.549:180360): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4898.127690][ T29] audit: type=1400 audit(4897.549:180361): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4898.131931][ T29] audit: type=1400 audit(4897.549:180362): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4898.134011][ T29] audit: type=1400 audit(4897.549:180363): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4898.135991][ T29] audit: type=1400 audit(4897.549:180364): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4898.137211][ T29] audit: type=1400 audit(4897.549:180365): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4898.138145][ T29] audit: type=1400 audit(4897.549:180366): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4909.783856][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 4909.784072][ T29] audit: type=1400 audit(4909.218:180371): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4909.798641][ T29] audit: type=1400 audit(4909.228:180372): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4909.801490][ T29] audit: type=1400 audit(4909.228:180373): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4909.803541][ T29] audit: type=1400 audit(4909.228:180374): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4909.805856][ T29] audit: type=1400 audit(4909.228:180375): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4909.807768][ T29] audit: type=1400 audit(4909.228:180376): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4909.811099][ T29] audit: type=1400 audit(4909.228:180377): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4909.821160][ T29] audit: type=1400 audit(4909.228:180378): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4909.823870][ T29] audit: type=1400 audit(4909.228:180379): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4909.827834][ T29] audit: type=1400 audit(4909.238:180380): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4917.793782][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4917.794005][ T29] audit: type=1400 audit(4917.228:180382): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4917.796831][ T29] audit: type=1400 audit(4917.228:180383): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4917.803853][ T29] audit: type=1400 audit(4917.238:180384): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4917.807875][ T29] audit: type=1400 audit(4917.238:180385): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4917.815174][ T29] audit: type=1400 audit(4917.248:180386): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4917.817256][ T29] audit: type=1400 audit(4917.248:180387): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4917.822113][ T29] audit: type=1400 audit(4917.248:180388): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4917.824291][ T29] audit: type=1400 audit(4917.248:180389): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4917.826076][ T29] audit: type=1400 audit(4917.248:180390): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4917.828342][ T29] audit: type=1400 audit(4917.248:180391): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4934.224489][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4934.224666][ T29] audit: type=1400 audit(4933.657:180393): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4934.234170][ T29] audit: type=1400 audit(4933.667:180394): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4934.237882][ T29] audit: type=1400 audit(4933.667:180395): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4934.239703][ T29] audit: type=1400 audit(4933.667:180396): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4934.243512][ T29] audit: type=1400 audit(4933.667:180397): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4934.250889][ T29] audit: type=1400 audit(4933.677:180398): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4934.252914][ T29] audit: type=1400 audit(4933.677:180399): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4934.255040][ T29] audit: type=1400 audit(4933.677:180400): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4934.256883][ T29] audit: type=1400 audit(4933.677:180401): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4934.258868][ T29] audit: type=1400 audit(4933.677:180402): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4953.246218][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 4953.246433][ T29] audit: type=1400 audit(4952.676:180409): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4953.252631][ T29] audit: type=1400 audit(4952.676:180410): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4953.262162][ T29] audit: type=1400 audit(4952.686:180411): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4953.264251][ T29] audit: type=1400 audit(4952.686:180412): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4953.266105][ T29] audit: type=1400 audit(4952.686:180413): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4953.268200][ T29] audit: type=1400 audit(4952.696:180414): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4953.269909][ T29] audit: type=1400 audit(4952.696:180415): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4953.280456][ T29] audit: type=1400 audit(4952.696:180416): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4953.283713][ T29] audit: type=1400 audit(4952.696:180417): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4953.285720][ T29] audit: type=1400 audit(4952.696:180418): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4958.988546][ T29] kauditd_printk_skb: 1208 callbacks suppressed [ 4958.988711][ T29] audit: type=1400 audit(4958.416:181627): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4958.995510][ T29] audit: type=1400 audit(4958.416:181628): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4959.001697][ T29] audit: type=1400 audit(4958.426:181629): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4959.008394][ T29] audit: type=1400 audit(4958.436:181630): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4959.009513][ T29] audit: type=1400 audit(4958.436:181631): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4959.010533][ T29] audit: type=1400 audit(4958.436:181632): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4959.012730][ T29] audit: type=1400 audit(4958.436:181633): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4959.013834][ T29] audit: type=1400 audit(4958.436:181634): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4959.016346][ T29] audit: type=1400 audit(4958.436:181635): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4959.018392][ T29] audit: type=1400 audit(4958.436:181636): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4973.706377][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 4973.706686][ T29] audit: type=1400 audit(4973.135:181643): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4973.710950][ T29] audit: type=1400 audit(4973.135:181644): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4973.719520][ T29] audit: type=1400 audit(4973.145:181645): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4973.726857][ T29] audit: type=1400 audit(4973.155:181646): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4973.728600][ T29] audit: type=1400 audit(4973.155:181647): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4973.730410][ T29] audit: type=1400 audit(4973.155:181648): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4973.735878][ T29] audit: type=1400 audit(4973.155:181649): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4973.736873][ T29] audit: type=1400 audit(4973.155:181650): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4973.737764][ T29] audit: type=1400 audit(4973.155:181651): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4973.739551][ T29] audit: type=1400 audit(4973.165:181652): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4981.075290][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4981.075494][ T29] audit: type=1400 audit(4980.505:181654): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4981.079976][ T29] audit: type=1400 audit(4980.505:181655): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4981.081593][ T29] audit: type=1400 audit(4980.505:181656): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4981.089606][ T29] audit: type=1400 audit(4980.515:181657): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4981.092708][ T29] audit: type=1400 audit(4980.515:181658): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4981.094316][ T29] audit: type=1400 audit(4980.515:181659): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4981.096099][ T29] audit: type=1400 audit(4980.515:181660): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4981.098088][ T29] audit: type=1400 audit(4980.525:181661): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4981.100087][ T29] audit: type=1400 audit(4980.525:181662): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4981.102834][ T29] audit: type=1400 audit(4980.525:181663): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 4998.310768][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 4998.311024][ T29] audit: type=1400 audit(4997.734:181665): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4998.324593][ T29] audit: type=1400 audit(4997.744:181666): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4998.326989][ T29] audit: type=1400 audit(4997.744:181667): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4998.328846][ T29] audit: type=1400 audit(4997.744:181668): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 4998.330878][ T29] audit: type=1400 audit(4997.754:181670): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4998.347836][ T29] audit: type=1400 audit(4997.764:181671): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 4998.349927][ T29] audit: type=1400 audit(4997.744:181669): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 4998.352200][ T29] audit: type=1400 audit(4997.774:181672): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 4998.356420][ T29] audit: type=1400 audit(4997.774:181673): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 4998.358515][ T29] audit: type=1400 audit(4997.774:181674): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5016.857996][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5016.858206][ T29] audit: type=1400 audit(5016.284:181679): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5016.861177][ T29] audit: type=1400 audit(5016.284:181680): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5016.862687][ T29] audit: type=1400 audit(5016.284:181681): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5016.875057][ T29] audit: type=1400 audit(5016.294:181682): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5016.884607][ T29] audit: type=1400 audit(5016.304:181683): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5016.886823][ T29] audit: type=1400 audit(5016.304:181684): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5016.891010][ T29] audit: type=1400 audit(5016.304:181685): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5016.892793][ T29] audit: type=1400 audit(5016.314:181686): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5016.905621][ T29] audit: type=1400 audit(5016.314:181687): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5016.908342][ T29] audit: type=1400 audit(5016.314:181688): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5025.868928][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5025.869097][ T29] audit: type=1400 audit(5025.293:181690): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5025.875670][ T29] audit: type=1400 audit(5025.293:181691): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5025.877077][ T29] audit: type=1400 audit(5025.303:181692): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5025.884515][ T29] audit: type=1400 audit(5025.303:181693): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5025.887582][ T29] audit: type=1400 audit(5025.313:181694): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5025.889258][ T29] audit: type=1400 audit(5025.313:181695): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5025.890754][ T29] audit: type=1400 audit(5025.313:181696): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5025.892263][ T29] audit: type=1400 audit(5025.313:181697): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5025.897587][ T29] audit: type=1400 audit(5025.313:181698): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5025.899205][ T29] audit: type=1400 audit(5025.313:181699): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5036.998481][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5036.998765][ T29] audit: type=1400 audit(5036.423:181704): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5037.002238][ T29] audit: type=1400 audit(5036.423:181705): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5037.003909][ T29] audit: type=1400 audit(5036.423:181706): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5037.015665][ T29] audit: type=1400 audit(5036.433:181707): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5037.016975][ T29] audit: type=1400 audit(5036.433:181708): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5037.018030][ T29] audit: type=1400 audit(5036.443:181709): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5037.019435][ T29] audit: type=1400 audit(5036.443:181710): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5037.021103][ T29] audit: type=1400 audit(5036.443:181711): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5037.023464][ T29] audit: type=1400 audit(5036.443:181712): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5037.027934][ T29] audit: type=1400 audit(5036.443:181713): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5044.184104][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5044.184272][ T29] audit: type=1400 audit(5043.603:181715): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5044.194013][ T29] audit: type=1400 audit(5043.603:181716): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5044.198161][ T29] audit: type=1400 audit(5043.603:181717): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5044.200279][ T29] audit: type=1400 audit(5043.613:181718): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5044.202225][ T29] audit: type=1400 audit(5043.613:181719): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5044.206092][ T29] audit: type=1400 audit(5043.623:181720): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5044.208454][ T29] audit: type=1400 audit(5043.623:181721): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5044.210454][ T29] audit: type=1400 audit(5043.623:181722): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5044.212811][ T29] audit: type=1400 audit(5043.623:181723): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5044.217850][ T29] audit: type=1400 audit(5043.623:181724): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5063.148940][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5063.149166][ T29] audit: type=1400 audit(5062.572:181726): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5063.152550][ T29] audit: type=1400 audit(5062.572:181727): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5063.154335][ T29] audit: type=1400 audit(5062.572:181728): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5063.161963][ T29] audit: type=1400 audit(5062.582:181729): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5063.168860][ T29] audit: type=1400 audit(5062.582:181730): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5063.170150][ T29] audit: type=1400 audit(5062.582:181731): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5063.171194][ T29] audit: type=1400 audit(5062.592:181732): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5063.172155][ T29] audit: type=1400 audit(5062.592:181733): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5063.173214][ T29] audit: type=1400 audit(5062.592:181734): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5063.174276][ T29] audit: type=1400 audit(5062.592:181735): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5080.560459][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5080.560731][ T29] audit: type=1400 audit(5079.981:181740): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5080.563295][ T29] audit: type=1400 audit(5079.981:181741): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5080.565779][ T29] audit: type=1400 audit(5079.981:181742): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5080.577632][ T29] audit: type=1400 audit(5079.991:181743): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5080.579668][ T29] audit: type=1400 audit(5080.001:181744): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5080.581170][ T29] audit: type=1400 audit(5080.001:181745): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5080.582764][ T29] audit: type=1400 audit(5080.001:181746): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5080.584810][ T29] audit: type=1400 audit(5080.001:181747): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5080.594184][ T29] audit: type=1400 audit(5080.001:181748): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5080.597431][ T29] audit: type=1400 audit(5080.001:181749): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5090.330997][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 5090.331233][ T29] audit: type=1400 audit(5089.751:181759): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5090.335096][ T29] audit: type=1400 audit(5089.751:181760): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5090.340136][ T29] audit: type=1400 audit(5089.771:181761): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5090.349710][ T29] audit: type=1400 audit(5089.771:181762): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5090.353001][ T29] audit: type=1400 audit(5089.771:181763): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5090.354770][ T29] audit: type=1400 audit(5089.771:181764): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5090.359567][ T29] audit: type=1400 audit(5089.771:181765): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5090.363272][ T29] audit: type=1400 audit(5089.771:181766): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5090.365241][ T29] audit: type=1400 audit(5089.771:181767): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5090.374025][ T29] audit: type=1400 audit(5089.771:181768): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5100.250500][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5100.250739][ T29] audit: type=1400 audit(5099.670:181773): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5100.253520][ T29] audit: type=1400 audit(5099.670:181774): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5100.259526][ T29] audit: type=1400 audit(5099.670:181775): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5100.267953][ T29] audit: type=1400 audit(5099.680:181776): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5100.270079][ T29] audit: type=1400 audit(5099.680:181777): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5100.271847][ T29] audit: type=1400 audit(5099.680:181778): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5100.273744][ T29] audit: type=1400 audit(5099.690:181779): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5100.276383][ T29] audit: type=1400 audit(5099.690:181780): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5100.279829][ T29] audit: type=1400 audit(5099.690:181781): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5100.281933][ T29] audit: type=1400 audit(5099.690:181782): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5107.301414][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5107.301587][ T29] audit: type=1400 audit(5106.730:181784): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5107.305336][ T29] audit: type=1400 audit(5106.730:181785): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5107.318262][ T29] audit: type=1400 audit(5106.740:181786): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5107.324650][ T29] audit: type=1400 audit(5106.740:181787): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5107.326677][ T29] audit: type=1400 audit(5106.740:181788): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5107.333396][ T29] audit: type=1400 audit(5106.740:181789): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5107.336287][ T29] audit: type=1400 audit(5106.740:181790): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5107.342337][ T29] audit: type=1400 audit(5106.740:181791): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5107.343702][ T29] audit: type=1400 audit(5106.750:181792): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5107.344644][ T29] audit: type=1400 audit(5106.750:181793): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5127.143896][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5127.144102][ T29] audit: type=1400 audit(5126.569:181795): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5127.146978][ T29] audit: type=1400 audit(5126.569:181796): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5127.152480][ T29] audit: type=1400 audit(5126.579:181797): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5127.163705][ T29] audit: type=1400 audit(5126.589:181798): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5127.166715][ T29] audit: type=1400 audit(5126.589:181799): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5127.176842][ T29] audit: type=1400 audit(5126.589:181800): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5127.180951][ T29] audit: type=1400 audit(5126.589:181801): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5127.183741][ T29] audit: type=1400 audit(5126.589:181802): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5127.186468][ T29] audit: type=1400 audit(5126.589:181803): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5127.189880][ T29] audit: type=1400 audit(5126.589:181804): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5145.063167][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5145.063427][ T29] audit: type=1400 audit(5144.489:181809): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5145.069557][ T29] audit: type=1400 audit(5144.489:181810): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5145.073268][ T29] audit: type=1400 audit(5144.499:181811): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5145.075080][ T29] audit: type=1400 audit(5144.499:181812): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5145.076948][ T29] audit: type=1400 audit(5144.499:181813): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5145.084386][ T29] audit: type=1400 audit(5144.499:181814): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5145.085829][ T29] audit: type=1400 audit(5144.499:181815): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5145.087359][ T29] audit: type=1400 audit(5144.499:181816): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5145.088422][ T29] audit: type=1400 audit(5144.499:181817): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5145.090332][ T29] audit: type=1400 audit(5144.499:181818): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5153.963857][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5153.964077][ T29] audit: type=1400 audit(5153.348:181820): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5153.987967][ T29] audit: type=1400 audit(5153.408:181821): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5153.992454][ T29] audit: type=1400 audit(5153.418:181822): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5153.994253][ T29] audit: type=1400 audit(5153.418:181823): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5153.997295][ T29] audit: type=1400 audit(5153.418:181824): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5154.008377][ T29] audit: type=1400 audit(5153.428:181825): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5154.012081][ T29] audit: type=1400 audit(5153.428:181826): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5154.014317][ T29] audit: type=1400 audit(5153.428:181827): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5154.016554][ T29] audit: type=1400 audit(5153.428:181828): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5154.018415][ T29] audit: type=1400 audit(5153.428:181829): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5164.993580][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5164.993820][ T29] audit: type=1400 audit(5164.418:181834): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5164.997346][ T29] audit: type=1400 audit(5164.418:181835): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5165.006297][ T29] audit: type=1400 audit(5164.428:181836): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5165.008335][ T29] audit: type=1400 audit(5164.428:181837): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5165.012737][ T29] audit: type=1400 audit(5164.428:181838): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5165.014914][ T29] audit: type=1400 audit(5164.428:181839): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5165.017241][ T29] audit: type=1400 audit(5164.428:181840): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5165.019080][ T29] audit: type=1400 audit(5164.428:181841): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5165.022675][ T29] audit: type=1400 audit(5164.428:181842): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5165.025027][ T29] audit: type=1400 audit(5164.428:181843): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5170.334030][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5170.334281][ T29] audit: type=1400 audit(5169.758:181845): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5170.338024][ T29] audit: type=1400 audit(5169.758:181846): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5170.346254][ T29] audit: type=1400 audit(5169.768:181847): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5170.355645][ T29] audit: type=1400 audit(5169.778:181848): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5170.356823][ T29] audit: type=1400 audit(5169.778:181849): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5170.357807][ T29] audit: type=1400 audit(5169.778:181850): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5170.359269][ T29] audit: type=1400 audit(5169.778:181851): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5170.364886][ T29] audit: type=1400 audit(5169.778:181852): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5170.365859][ T29] audit: type=1400 audit(5169.778:181853): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5170.367582][ T29] audit: type=1400 audit(5169.778:181854): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5188.590891][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5188.591109][ T29] audit: type=1400 audit(5187.997:181856): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3120 comm="dhcpcd" [ 5188.602105][ T29] audit: type=1400 audit(5188.027:181857): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5188.604477][ T29] audit: type=1400 audit(5188.027:181858): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5188.616201][ T29] audit: type=1400 audit(5188.027:181859): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3119 comm="dhcpcd" name="/" dev="vda" ino=2 [ 5188.617746][ T29] audit: type=1400 audit(5188.027:181860): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5188.619064][ T29] audit: type=1400 audit(5188.027:181861): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5188.622751][ T29] audit: type=1400 audit(5188.037:181862): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3119 comm="dhcpcd" name="/" dev="proc" ino=1 [ 5188.624395][ T29] audit: type=1400 audit(5188.037:181864): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5188.626164][ T29] audit: type=1400 audit(5188.037:181863): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3119 comm="dhcpcd" name="sys" dev="proc" ino=4026531856 [ 5188.627997][ T29] audit: type=1400 audit(5188.037:181865): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5209.336484][ T29] kauditd_printk_skb: 1213 callbacks suppressed [ 5209.336688][ T29] audit: type=1400 audit(5208.756:183079): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5209.348902][ T29] audit: type=1400 audit(5208.756:183080): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5209.352142][ T29] audit: type=1400 audit(5208.766:183081): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5209.358948][ T29] audit: type=1400 audit(5208.766:183082): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5209.382642][ T29] audit: type=1400 audit(5208.766:183083): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5209.384837][ T29] audit: type=1400 audit(5208.776:183084): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5209.392599][ T29] audit: type=1400 audit(5208.776:183085): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5209.394401][ T29] audit: type=1400 audit(5208.786:183086): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5209.396312][ T29] audit: type=1400 audit(5208.786:183087): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5209.397892][ T29] audit: type=1400 audit(5208.786:183088): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5217.145731][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5217.145961][ T29] audit: type=1400 audit(5216.566:183090): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5217.150298][ T29] audit: type=1400 audit(5216.566:183091): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5217.158754][ T29] audit: type=1400 audit(5216.566:183092): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5217.166208][ T29] audit: type=1400 audit(5216.586:183093): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5217.168352][ T29] audit: type=1400 audit(5216.586:183094): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5217.170387][ T29] audit: type=1400 audit(5216.586:183095): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5217.175954][ T29] audit: type=1400 audit(5216.586:183096): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5217.178367][ T29] audit: type=1400 audit(5216.586:183097): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5217.180475][ T29] audit: type=1400 audit(5216.586:183098): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5217.184136][ T29] audit: type=1400 audit(5216.586:183099): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5228.678776][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5228.678994][ T29] audit: type=1400 audit(5228.095:183104): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5228.690826][ T29] audit: type=1400 audit(5228.105:183105): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5228.694965][ T29] audit: type=1400 audit(5228.105:183106): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5228.696328][ T29] audit: type=1400 audit(5228.115:183107): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5228.697893][ T29] audit: type=1400 audit(5228.115:183108): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5228.699285][ T29] audit: type=1400 audit(5228.115:183109): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5228.700697][ T29] audit: type=1400 audit(5228.115:183110): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5228.704980][ T29] audit: type=1400 audit(5228.115:183111): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5228.706803][ T29] audit: type=1400 audit(5228.115:183112): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5228.708251][ T29] audit: type=1400 audit(5228.115:183113): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5235.146839][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5235.146977][ T29] audit: type=1400 audit(5234.565:183115): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5235.155604][ T29] audit: type=1400 audit(5234.575:183116): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5235.156810][ T29] audit: type=1400 audit(5234.575:183117): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5235.159333][ T29] audit: type=1400 audit(5234.575:183118): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5235.160441][ T29] audit: type=1400 audit(5234.575:183119): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5235.164768][ T29] audit: type=1400 audit(5234.575:183120): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5235.166496][ T29] audit: type=1400 audit(5234.575:183121): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5235.168091][ T29] audit: type=1400 audit(5234.575:183122): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5235.169593][ T29] audit: type=1400 audit(5234.575:183123): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5235.171479][ T29] audit: type=1400 audit(5234.575:183124): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5254.571888][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 5254.572123][ T29] audit: type=1400 audit(5253.984:183128): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5254.577511][ T29] audit: type=1400 audit(5253.994:183129): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5254.579261][ T29] audit: type=1400 audit(5253.994:183130): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5254.587882][ T29] audit: type=1400 audit(5254.004:183131): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5254.594578][ T29] audit: type=1400 audit(5254.004:183132): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5254.596359][ T29] audit: type=1400 audit(5254.004:183133): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5254.603696][ T29] audit: type=1400 audit(5254.014:183134): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5254.608870][ T29] audit: type=1400 audit(5254.024:183135): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5254.610817][ T29] audit: type=1400 audit(5254.024:183136): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5254.612514][ T29] audit: type=1400 audit(5254.024:183137): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5272.417823][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 5272.418045][ T29] audit: type=1400 audit(5271.834:183150): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5272.428666][ T29] audit: type=1400 audit(5271.844:183151): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5272.432759][ T29] audit: type=1400 audit(5271.844:183152): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5272.442153][ T29] audit: type=1400 audit(5271.864:183153): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5272.449412][ T29] audit: type=1400 audit(5271.864:183154): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5272.456093][ T29] audit: type=1400 audit(5271.864:183155): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5272.457849][ T29] audit: type=1400 audit(5271.864:183156): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5272.462440][ T29] audit: type=1400 audit(5271.864:183157): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5272.467908][ T29] audit: type=1400 audit(5271.864:183158): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5272.469748][ T29] audit: type=1400 audit(5271.864:183159): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5281.537561][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5281.537692][ T29] audit: type=1400 audit(5280.953:183161): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5281.545494][ T29] audit: type=1400 audit(5280.953:183162): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5281.552431][ T29] audit: type=1400 audit(5280.963:183163): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5281.558279][ T29] audit: type=1400 audit(5280.973:183164): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5281.561660][ T29] audit: type=1400 audit(5280.973:183165): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5281.563569][ T29] audit: type=1400 audit(5280.973:183166): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5281.569652][ T29] audit: type=1400 audit(5280.973:183167): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5281.571414][ T29] audit: type=1400 audit(5280.973:183168): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5281.573321][ T29] audit: type=1400 audit(5280.973:183169): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5281.581647][ T29] audit: type=1400 audit(5280.973:183170): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5292.858082][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 5292.858259][ T29] audit: type=1400 audit(5292.273:183183): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5292.860893][ T29] audit: type=1400 audit(5292.273:183184): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5292.862955][ T29] audit: type=1400 audit(5292.273:183185): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5292.870940][ T29] audit: type=1400 audit(5292.283:183186): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5292.872985][ T29] audit: type=1400 audit(5292.283:183187): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5292.879864][ T29] audit: type=1400 audit(5292.283:183188): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5292.882181][ T29] audit: type=1400 audit(5292.283:183189): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5292.887830][ T29] audit: type=1400 audit(5292.283:183190): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5292.889767][ T29] audit: type=1400 audit(5292.283:183191): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5292.891763][ T29] audit: type=1400 audit(5292.283:183192): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5299.155675][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5299.155878][ T29] audit: type=1400 audit(5298.563:183194): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5299.162673][ T29] audit: type=1400 audit(5298.573:183195): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5299.165892][ T29] audit: type=1400 audit(5298.573:183196): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5299.172231][ T29] audit: type=1400 audit(5298.583:183197): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5299.176894][ T29] audit: type=1400 audit(5298.583:183198): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5299.178940][ T29] audit: type=1400 audit(5298.583:183199): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5299.180790][ T29] audit: type=1400 audit(5298.583:183200): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5299.182911][ T29] audit: type=1400 audit(5298.593:183201): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5299.186802][ T29] audit: type=1400 audit(5298.593:183202): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=12 [ 5299.189105][ T29] audit: type=1400 audit(5298.593:183203): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 [ 5317.751795][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 5317.752043][ T29] audit: type=1400 audit(5317.162:183232): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5317.754889][ T29] audit: type=1400 audit(5317.162:183233): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5317.777040][ T29] audit: type=1400 audit(5317.162:183234): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5317.779749][ T29] audit: type=1400 audit(5317.182:183235): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5317.781620][ T29] audit: type=1400 audit(5317.182:183236): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5317.783439][ T29] audit: type=1400 audit(5317.192:183237): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5317.787222][ T29] audit: type=1400 audit(5317.192:183238): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5317.790536][ T29] audit: type=1400 audit(5317.192:183239): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5317.793398][ T29] audit: type=1400 audit(5317.192:183240): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5317.797005][ T29] audit: type=1400 audit(5317.192:183241): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5335.820353][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5335.820594][ T29] audit: type=1400 audit(5335.231:183246): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5335.823111][ T29] audit: type=1400 audit(5335.231:183247): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5335.825040][ T29] audit: type=1400 audit(5335.231:183248): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5335.833990][ T29] audit: type=1400 audit(5335.241:183249): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5335.840461][ T29] audit: type=1400 audit(5335.251:183250): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5335.842505][ T29] audit: type=1400 audit(5335.251:183251): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5335.844270][ T29] audit: type=1400 audit(5335.251:183252): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5335.851114][ T29] audit: type=1400 audit(5335.251:183253): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5335.853279][ T29] audit: type=1400 audit(5335.251:183254): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5335.855510][ T29] audit: type=1400 audit(5335.251:183255): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5345.899928][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5345.900125][ T29] audit: type=1400 audit(5345.311:183257): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5345.901973][ T29] audit: type=1400 audit(5345.311:183258): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5345.902908][ T29] audit: type=1400 audit(5345.311:183259): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5345.913336][ T29] audit: type=1400 audit(5345.321:183260): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5345.915343][ T29] audit: type=1400 audit(5345.321:183261): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5345.923217][ T29] audit: type=1400 audit(5345.321:183262): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5345.925125][ T29] audit: type=1400 audit(5345.321:183263): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5345.932781][ T29] audit: type=1400 audit(5345.321:183264): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5345.934938][ T29] audit: type=1400 audit(5345.321:183265): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5345.939390][ T29] audit: type=1400 audit(5345.341:183266): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5356.941167][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5356.941455][ T29] audit: type=1400 audit(5356.350:183271): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5356.949007][ T29] audit: type=1400 audit(5356.350:183272): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5356.954436][ T29] audit: type=1400 audit(5356.360:183273): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5356.963809][ T29] audit: type=1400 audit(5356.370:183274): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5356.966302][ T29] audit: type=1400 audit(5356.370:183275): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5356.973804][ T29] audit: type=1400 audit(5356.370:183276): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5356.975357][ T29] audit: type=1400 audit(5356.370:183277): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5356.977723][ T29] audit: type=1400 audit(5356.370:183278): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5356.979092][ T29] audit: type=1400 audit(5356.370:183279): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5356.980615][ T29] audit: type=1400 audit(5356.370:183280): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5363.344194][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5363.344354][ T29] audit: type=1400 audit(5362.750:183282): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5363.349897][ T29] audit: type=1400 audit(5362.750:183283): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5363.351408][ T29] audit: type=1400 audit(5362.750:183284): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5363.356016][ T29] audit: type=1400 audit(5362.760:183285): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5363.361024][ T29] audit: type=1400 audit(5362.780:183286): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5363.363247][ T29] audit: type=1400 audit(5362.780:183287): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5363.364856][ T29] audit: type=1400 audit(5362.780:183288): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5363.365928][ T29] audit: type=1400 audit(5362.780:183289): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5363.379013][ T29] audit: type=1400 audit(5362.780:183290): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5363.381048][ T29] audit: type=1400 audit(5362.780:183291): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5382.561927][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5382.562046][ T29] audit: type=1400 audit(5381.979:183293): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5382.580115][ T29] audit: type=1400 audit(5381.989:183294): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5382.581248][ T29] audit: type=1400 audit(5381.989:183295): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5382.582791][ T29] audit: type=1400 audit(5381.989:183296): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5382.583698][ T29] audit: type=1400 audit(5381.989:183297): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5382.584620][ T29] audit: type=1400 audit(5381.989:183298): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5382.585535][ T29] audit: type=1400 audit(5381.989:183299): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5382.586435][ T29] audit: type=1400 audit(5381.989:183300): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5382.589665][ T29] audit: type=1400 audit(5381.989:183301): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5382.590840][ T29] audit: type=1400 audit(5381.999:183302): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5399.872673][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 5399.872919][ T29] audit: type=1400 audit(5399.289:183315): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5399.888982][ T29] audit: type=1400 audit(5399.289:183316): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5399.890887][ T29] audit: type=1400 audit(5399.289:183317): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5399.899574][ T29] audit: type=1400 audit(5399.309:183318): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5399.902460][ T29] audit: type=1400 audit(5399.309:183319): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5399.909931][ T29] audit: type=1400 audit(5399.319:183320): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5399.911995][ T29] audit: type=1400 audit(5399.319:183321): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5399.914159][ T29] audit: type=1400 audit(5399.319:183322): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5399.916315][ T29] audit: type=1400 audit(5399.329:183323): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5399.919144][ T29] audit: type=1400 audit(5399.329:183324): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5410.582337][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5410.582605][ T29] audit: type=1400 audit(5409.998:183326): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5410.585340][ T29] audit: type=1400 audit(5409.998:183327): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5410.594193][ T29] audit: type=1400 audit(5409.998:183328): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5410.603206][ T29] audit: type=1400 audit(5410.018:183329): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5410.605555][ T29] audit: type=1400 audit(5410.018:183330): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5410.607710][ T29] audit: type=1400 audit(5410.018:183331): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5410.614049][ T29] audit: type=1400 audit(5410.018:183332): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5410.616176][ T29] audit: type=1400 audit(5410.018:183333): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5410.617957][ T29] audit: type=1400 audit(5410.018:183334): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5410.621881][ T29] audit: type=1400 audit(5410.028:183335): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5421.097347][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5421.097650][ T29] audit: type=1400 audit(5420.508:183340): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5421.105674][ T29] audit: type=1400 audit(5420.518:183341): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5421.108710][ T29] audit: type=1400 audit(5420.518:183342): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5421.114194][ T29] audit: type=1400 audit(5420.528:183343): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5421.116203][ T29] audit: type=1400 audit(5420.528:183344): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5421.118111][ T29] audit: type=1400 audit(5420.528:183345): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5421.133995][ T29] audit: type=1400 audit(5420.528:183346): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5421.136540][ T29] audit: type=1400 audit(5420.528:183347): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5421.138316][ T29] audit: type=1400 audit(5420.528:183348): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5421.143253][ T29] audit: type=1400 audit(5420.528:183349): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5428.102992][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5428.103171][ T29] audit: type=1400 audit(5427.518:183351): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5428.105654][ T29] audit: type=1400 audit(5427.518:183352): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5428.108117][ T29] audit: type=1400 audit(5427.518:183353): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5428.115664][ T29] audit: type=1400 audit(5427.528:183354): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5428.120551][ T29] audit: type=1400 audit(5427.528:183355): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5428.122896][ T29] audit: type=1400 audit(5427.528:183356): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5428.124615][ T29] audit: type=1400 audit(5427.538:183357): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5428.126255][ T29] audit: type=1400 audit(5427.538:183358): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5428.127800][ T29] audit: type=1400 audit(5427.538:183359): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5428.130921][ T29] audit: type=1400 audit(5427.538:183360): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5445.714001][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5445.714205][ T29] audit: type=1400 audit(5445.127:183362): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5445.718163][ T29] audit: type=1400 audit(5445.127:183363): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5445.726492][ T29] audit: type=1400 audit(5445.137:183364): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5445.728173][ T29] audit: type=1400 audit(5445.137:183365): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5445.734250][ T29] audit: type=1400 audit(5445.137:183366): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5445.736409][ T29] audit: type=1400 audit(5445.137:183367): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5445.738109][ T29] audit: type=1400 audit(5445.147:183368): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5445.742615][ T29] audit: type=1400 audit(5445.147:183369): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5445.744965][ T29] audit: type=1400 audit(5445.147:183370): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5445.748681][ T29] audit: type=1400 audit(5445.147:183371): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5463.905023][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5463.905251][ T29] audit: type=1400 audit(5463.317:183376): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5463.908819][ T29] audit: type=1400 audit(5463.317:183377): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5463.914988][ T29] audit: type=1400 audit(5463.326:183378): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5463.916497][ T29] audit: type=1400 audit(5463.326:183379): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5463.917932][ T29] audit: type=1400 audit(5463.326:183380): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5463.919386][ T29] audit: type=1400 audit(5463.326:183381): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5463.922429][ T29] audit: type=1400 audit(5463.326:183382): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5463.924083][ T29] audit: type=1400 audit(5463.326:183383): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5463.925691][ T29] audit: type=1400 audit(5463.326:183384): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5463.933591][ T29] audit: type=1400 audit(5463.346:183385): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5474.826124][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5474.826327][ T29] audit: type=1400 audit(5474.236:183387): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5474.835872][ T29] audit: type=1400 audit(5474.236:183388): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5474.837803][ T29] audit: type=1400 audit(5474.236:183389): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5474.839512][ T29] audit: type=1400 audit(5474.246:183390): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5474.845435][ T29] audit: type=1400 audit(5474.246:183391): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5474.847789][ T29] audit: type=1400 audit(5474.246:183392): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5474.849658][ T29] audit: type=1400 audit(5474.256:183393): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5474.852251][ T29] audit: type=1400 audit(5474.256:183394): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5474.853853][ T29] audit: type=1400 audit(5474.256:183395): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5474.855543][ T29] audit: type=1400 audit(5474.256:183396): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5484.125094][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5484.125266][ T29] audit: type=1400 audit(5483.536:183401): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5484.144327][ T29] audit: type=1400 audit(5483.546:183402): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5484.147045][ T29] audit: type=1400 audit(5483.546:183404): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5484.150094][ T29] audit: type=1400 audit(5483.546:183403): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5484.154238][ T29] audit: type=1400 audit(5483.546:183405): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5484.156531][ T29] audit: type=1400 audit(5483.546:183406): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5484.158635][ T29] audit: type=1400 audit(5483.546:183407): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5484.160883][ T29] audit: type=1400 audit(5483.546:183408): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5484.163857][ T29] audit: type=1400 audit(5483.556:183409): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5484.166047][ T29] audit: type=1400 audit(5483.556:183410): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5491.752580][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5491.752902][ T29] audit: type=1400 audit(5491.155:183412): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5491.757928][ T29] audit: type=1400 audit(5491.165:183413): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5491.759286][ T29] audit: type=1400 audit(5491.165:183414): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5491.767553][ T29] audit: type=1400 audit(5491.175:183415): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5491.769847][ T29] audit: type=1400 audit(5491.175:183416): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5491.776077][ T29] audit: type=1400 audit(5491.175:183417): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5491.777207][ T29] audit: type=1400 audit(5491.175:183418): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5491.778177][ T29] audit: type=1400 audit(5491.175:183419): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5491.779513][ T29] audit: type=1400 audit(5491.175:183420): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5491.780474][ T29] audit: type=1400 audit(5491.175:183421): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5510.385167][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5510.385329][ T29] audit: type=1400 audit(5509.795:183423): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5510.387898][ T29] audit: type=1400 audit(5509.795:183424): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5510.391198][ T29] audit: type=1400 audit(5509.795:183425): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5510.405308][ T29] audit: type=1400 audit(5509.805:183426): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5510.407197][ T29] audit: type=1400 audit(5509.815:183427): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5510.409115][ T29] audit: type=1400 audit(5509.815:183428): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5510.411208][ T29] audit: type=1400 audit(5509.815:183429): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5510.416137][ T29] audit: type=1400 audit(5509.815:183430): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5510.418256][ T29] audit: type=1400 audit(5509.815:183431): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5510.420618][ T29] audit: type=1400 audit(5509.815:183432): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5527.088021][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5527.088220][ T29] audit: type=1400 audit(5526.494:183437): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5527.097827][ T29] audit: type=1400 audit(5526.504:183438): lsm=SMACK fn=smack_unix_may_send action=granted subject="_" object="_" requested=w pid=3118 comm="dhcpcd" [ 5527.101350][ T29] audit: type=1400 audit(5526.504:183439): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5527.114366][ T29] audit: type=1400 audit(5526.504:183440): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5527.116395][ T29] audit: type=1400 audit(5526.504:183441): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5527.118264][ T29] audit: type=1400 audit(5526.504:183442): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5527.120093][ T29] audit: type=1400 audit(5526.504:183443): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5527.121865][ T29] audit: type=1400 audit(5526.504:183444): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5527.130814][ T29] audit: type=1400 audit(5526.514:183445): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5527.134258][ T29] audit: type=1400 audit(5526.514:183446): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5536.410142][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 5536.410317][ T29] audit: type=1400 audit(5535.814:183448): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=0 comm="swapper/0" saddr=10.0.2.2 src=43260 daddr=10.0.2.15 dest=22 netif=eth0 [ 5536.422594][ T29] audit: type=1400 audit(5535.824:183449): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5536.431162][ T29] audit: type=1400 audit(5535.834:183450): lsm=SMACK fn=smack_socket_sock_rcv_skb action=granted subject="_" object="_" requested=w pid=16 comm="ksoftirqd/0" saddr=10.0.2.2 src=43260 daddr=10.0.2.15 dest=22 netif=eth0 [ 5536.439532][ T29] audit: type=1400 audit(5535.834:183451): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5536.442102][ T29] audit: type=1400 audit(5535.834:183452): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="var" dev="vda" ino=1718 [ 5536.446144][ T29] audit: type=1400 audit(5535.834:183453): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="vda" ino=2 [ 5536.447848][ T29] audit: type=1400 audit(5535.834:183454): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=x pid=3074 comm="syslogd" name="/" dev="tmpfs" ino=1 [ 5536.449785][ T29] audit: type=1400 audit(5535.834:183455): lsm=SMACK fn=smack_inode_permission action=granted subject="_" object="_" requested=wa pid=3074 comm="syslogd" name="messages" dev="tmpfs" ino=13 [ 5536.452295][ T29] audit: type=1400 audit(5535.844:183456): lsm=SMACK fn=smack_file_open action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 [ 5536.456217][ T29] audit: type=1400 audit(5535.844:183457): lsm=SMACK fn=smack_inode_getattr action=granted subject="_" object="_" requested=r pid=3074 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 VM DIAGNOSIS: 22:17:54 Registers: info registers vcpu 0 CPU#0 PC=ffff800081a54f4c X00=ffff800081a54f48 X01=ffff80008275a780 X02=0000000000000001 X03=0000000000000003 X04=0000000000000000 X05=f5f000000ada20c8 X06=0000000000000000 X07=00000000000006c0 X08=ffff800080003678 X09=ffff800082743000 X10=ffff8000800036c4 X11=0000000000000001 X12=0000000000000000 X13=f5f000000ada20c6 X14=f5f000000ada26c0 X15=ffff8000800034d0 X16=00000000297e44d1 X17=ffff8000828934a8 X18=ffffffffffffffff X19=0000000000000000 X20=ffff800082851008 X21=ffff800082851000 X22=00000000000000c0 X23=0000000000000006 X24=ffff800082851008 X25=0000000000000028 X26=fff000007f8d7600 X27=ffff800082a7d440 X28=f1f000000459af80 X29=ffff800080003490 X30=ffff80008016cd94 SP=ffff800080003490 PSTATE=404000c9 -Z-- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000000000000000 P01=0000000000000000 P02=0000000000000000 P03=0000000000000000 P04=0000000000000000 P05=0000000000000000 P06=0000000000000000 P07=0000000000000000 P08=0000000000000000 P09=0000000000000000 P10=0000000000000000 P11=0000000000000000 P12=0000000000000000 P13=0000000000000000 P14=0000000000000000 P15=0000000000000000 FFR=0000000000000000 Z00=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000001 Z01=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z02=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0002880300000002:0806028003080002 Z03=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:000008060a0108a4:1008000480030008 Z04=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:05098004000401de:0800028808000100 Z05=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0002880300000002:0806028003080002 Z06=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:030c100023800401:0000000806060151 Z07=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:662f2e01ffffffff:ffffffffef080580 Z08=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:000001f40000000a Z09=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000ffffd3b3e8f0:0000ffffd3b3e8f0 Z17=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:ffffff80ffffffd0:0000ffffd3b3e8c0 Z18=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800081a550e0 X00=00000000001fec2c X01=fff000007f8ead40 X02=fff07ffffd1cf000 X03=ffff800082b8bdd0 X04=fff07ffffd1cf000 X05=4000000000000000 X06=f7f00000030834d0 X07=000000002c820103 X08=0000000000000000 X09=0000000000000002 X10=172cfc7ee5f26c1a X11=0000050aaaf489f0 X12=0000000000000001 X13=ffff8000827400c8 X14=000000000000039d X15=0000000000000001 X16=0000000000000001 X17=0000000000000115 X18=0000000000000001 X19=0000000000000001 X20=ffff800082740080 X21=f5f000000323ed80 X22=ffff8000827400c0 X23=0000000000000000 X24=0000000000000000 X25=f5f000000323ed80 X26=0000000000000000 X27=0000000000000000 X28=0000000000000000 X29=ffff800082b8bdf0 X30=ffff800081a550f4 SP=ffff800082b8bdf0 PSTATE=604000c9 -ZC- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000000000000000 P01=0000000000000000 P02=0000000000000000 P03=0000000000000000 P04=0000000000000000 P05=0000000000000000 P06=0000000000000000 P07=0000000000000000 P08=0000000000000000 P09=0000000000000000 P10=0000000000000000 P11=0000000000000000 P12=0000000000000000 P13=0000000000000000 P14=0000000000000000 P15=0000000000000000 FFR=0000000000000000 Z00=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z01=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:ffffff80ffffffd0:0000ffffcbe684c0 Z02=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:f00ff00ff00ff00f:f00ff00ff00ff00f Z03=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:f000000000000000:000000000000f000 Z04=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:f00ff00ff00ff00f:f00ff00ff00ff00f Z05=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:f0000000000000f0:f0000000000000f0 Z06=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0ccccc0000000000:0ccccc0000000000 Z07=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z08=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z16=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z17=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z18=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000:0000000000000000