last executing test programs: 58m38.271457254s ago: executing program 1 (id=81): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000004280)={0x84, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x33, 0xe, {{{}, {}, @broadcast, @device_b, @random="1fb135d19a0a"}, 0x0, @default, 0x0, @void, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_TX_RATES={0x1c, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x18, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0xc, 0x2, [{0x1, 0x7}, {0x7, 0x3}, {0x6}, {0x7}, {0x7, 0x2}, {0x0, 0x3}, {0x3, 0x8}, {0x4, 0x1}]}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}]}]}]}, 0x84}}, 0x4040) 49m28.173672118s ago: executing program 1 (id=81): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000004280)={0x84, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x33, 0xe, {{{}, {}, @broadcast, @device_b, @random="1fb135d19a0a"}, 0x0, @default, 0x0, @void, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_TX_RATES={0x1c, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x18, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0xc, 0x2, [{0x1, 0x7}, {0x7, 0x3}, {0x6}, {0x7}, {0x7, 0x2}, {0x0, 0x3}, {0x3, 0x8}, {0x4, 0x1}]}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}]}]}]}, 0x84}}, 0x4040) 39m43.845571467s ago: executing program 1 (id=81): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000004280)={0x84, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x33, 0xe, {{{}, {}, @broadcast, @device_b, @random="1fb135d19a0a"}, 0x0, @default, 0x0, @void, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_TX_RATES={0x1c, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x18, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0xc, 0x2, [{0x1, 0x7}, {0x7, 0x3}, {0x6}, {0x7}, {0x7, 0x2}, {0x0, 0x3}, {0x3, 0x8}, {0x4, 0x1}]}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}]}]}]}, 0x84}}, 0x4040) 30m13.456763912s ago: executing program 1 (id=81): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000004280)={0x84, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x33, 0xe, {{{}, {}, @broadcast, @device_b, @random="1fb135d19a0a"}, 0x0, @default, 0x0, @void, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_TX_RATES={0x1c, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x18, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0xc, 0x2, [{0x1, 0x7}, {0x7, 0x3}, {0x6}, {0x7}, {0x7, 0x2}, {0x0, 0x3}, {0x3, 0x8}, {0x4, 0x1}]}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}]}]}]}, 0x84}}, 0x4040) 21m14.808679323s ago: executing program 1 (id=81): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000004280)={0x84, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x33, 0xe, {{{}, {}, @broadcast, @device_b, @random="1fb135d19a0a"}, 0x0, @default, 0x0, @void, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_TX_RATES={0x1c, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x18, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0xc, 0x2, [{0x1, 0x7}, {0x7, 0x3}, {0x6}, {0x7}, {0x7, 0x2}, {0x0, 0x3}, {0x3, 0x8}, {0x4, 0x1}]}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}]}]}]}, 0x84}}, 0x4040) 12m21.049468467s ago: executing program 1 (id=81): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000004280)={0x84, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x33, 0xe, {{{}, {}, @broadcast, @device_b, @random="1fb135d19a0a"}, 0x0, @default, 0x0, @void, @void, @val={0x3, 0x1}, @val={0x4, 0x6}, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_TX_RATES={0x1c, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x18, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0xc, 0x2, [{0x1, 0x7}, {0x7, 0x3}, {0x6}, {0x7}, {0x7, 0x2}, {0x0, 0x3}, {0x3, 0x8}, {0x4, 0x1}]}, @NL80211_TXRATE_HE_GI={0x5, 0x6, 0x1}]}]}]}, 0x84}}, 0x4040) 38.560882848s ago: executing program 0 (id=415): clock_adjtime(0x0, &(0x7f0000000000)={0x66b9, 0x80000001, 0x0, 0x2, 0x0, 0xfffffffffffffffd, 0x0, 0x3, 0x0, 0x8, 0x2, 0x248a, 0x9, 0x2, 0x0, 0x0, 0x3ff, 0xf, 0x0, 0x9, 0x5999, 0x0, 0x0, 0x0, 0x2be}) 36.389671435s ago: executing program 0 (id=416): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(r0, &(0x7f0000004300)="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", 0x2000, &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x90, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000}}}, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000006300)="c4acef607b9ddcfd235a03c6db2c1419c3332fd94e60bb741ab4a8750cdb46d41965ca8c176409eae88e4d142adc35d20aeb6cee87b470c46a623ffd2c7b92b7b2026c8a2d3a08f7c376bba66ea2fd6bd26a5903aab1fd5f08c5c80a017bd0a1f16e11ed288e1f71fd8f904cd60c2bad8ba59003a9216f171640535484f6706eda84c4a11c63565004ac33cb6040901b5f14b2406a1ddc7ca78fa91f3d575ec92c1c73d56c7d02de887a84a9b88c9b70f0bf2141e1f624e8222a9a63ba199362c8bff33780e6c79435460ada699e037ee7894aeecf7d3b089fa428a18edfe239134a244f69ecda10834e06e1466d95effc76211b61514522c429e80691780744f5e470e417559879fd7c7cdbde84361bb2491dc53a481b3bb5c071926f0c57af8745b52e6b07b053daad9e52a29869f3bee8c9ff43b2e9c20a26035ac89169b7058ee967b44365648f510555c701188079c745776f55748c32867df6e4e78890a32f126197f55113ce4e8c5397224ab6fb9124bdb0050fdb92a42237292668a7aa615216e39f78210b2774f0849a79fd446bdf2ec38d7c61e5384ca5ca6c040522d42102515d86c7743a8f384bf18efffb69d0ad0abb7c48fc8f770152226d05363ea26a7aabb3450905bf28dbc5fadbebe2ea45a4d82e2bcc574bcfd3e3164ee9ce2eb86cf356bd2822699a21dde91d2117e3647d926db9c7bece2484bd81a972c293226a1cbe15f233822fdfd042d6b6515b49f9f1d585b1f0fb596e50eea60ea3f4cc8808b576a1de2c7111df3cef7b090e5b5db7f616d5bc83428b4f55f97e87e43b3360c5099455193584fd94568890e87224bfc9b117d0172d85a176dd2c6828c0144b5398e7354d5923f8014bc3d30860c153696cc776c3982fdef7641bc61d3b21baf0f76adfb94d135ff87393174fd9ca5363e2834a24a06c16522bffb0f60d69cc8440d8a0dfbb47c7d8d6707cd7cbb34fbc8f8d3c4490b31b92806e0d56f83b2a2c7ad88ddb4d0e7dcff8aac6414b8be9c2c9855d5a441f4b34d55fb08306a8fa2832d70023ab0f63ff75629c0e98d64870fd4cd242a6f27fa6163994ec50e18071f5344c6786b01f2d7268930375188e04e0408c973d4872330b96aa88db2fc1860accbccb65f771ced5305891c44ac410541ac980ba50f419503aa058774737c77965db9ec9af213e516fa0a2468d788289337c5babad8c418a3af875ffc8bc39c62e94acf6b1bcbd28274a2e62092f87095958c8bc657ba788907902746872a6441966c9663198d1b54ce5c660ed0b7cfa1d6d3a81de7d16fd017d7f041c30b7f334889feca18596cbf344286563dd59b7c65697c4a3cf587c0682de6fc105628bdd1990dcb3fed18e1192ca07fe4a05be1efbc4057476257a59fcdd24eb040acef0f94ededf984978413ede4793255c0e6b24a5ee1713692149849e60f65c10e437db0a8e97807ea27f0a42f60b5ec86e85ab4eb9a81e2463b00afe7d20cbd30ee600b57202434e1fed80ef2cb45eec5362178b9e490dc0b8a45e10feb8a08138778364a2983a113b671e04d60ab4f18f383300228631cab01302c20c624c8e74bdb6ac3a7cf062f8db96416ff19e42ebb72aed1b46a063cbcb1b16b76abfa628e885cad99ca26b23929ed4602b5e897b019da855b58691503d3021f9c1b314105037a2be7e73d49f8ee9f0a3c3e6e2cec44cb6258d1862c3341b053db1b67640ec14afbbbca41b1b500ee3a0c22a712a02a1b2bfbaaa62ed542fceecc1ee426f9ed748d8656ceab891a9d5a8784ee78e18159abaf531c44829374b4814176534af4adfedb5efead99e214f52b0b2eb9e217c6bbda92a01edb0d5037e2038d8a0fb61f95c377817cf2af1568a66e395596c4045d4be3619adcf70879827dd90c45386c39b0248832254b2f7e646289ecd0aba2a56213e504bcf536ee6567baa25db9fbab142b4a333441778db9b672ccf0154f3f5adaffbf9a36472713077a90fa7828fe58c157593235de0617b7a13c0f269401bceb6f3a5c3eb151c97f3d8ef579f665777f4d801f0df77ae72433c488dabe2504ac0fd0e9703e9b960fcac1063704268e24a40890d627e0f6c38c0cf99b4d11436642dab9452834b13686e8b90cc07e4588c60aed21b90bcf73de85fddd85926557c6aec3510adf2d82f411b16b8013c408cfcb88d519daf256dce2c8a460e82bd0e6bf05c7d901157123dc9b8b1581fbb7bb8127f7adc01c926f6f79bbf666dd35df271cb0816418e71b18653bb1f246d07af5becaeb81abd83ebfce8f874daaf6b6acca7f313ed43570dd6a81548c2d7a0e1cf56124a7a441fe92fd12a5963cf6718543d429499a76f7613cfb7c7f638fbcee879929126cf1cca0c263320d8f34dcd1af2345b9801fcb38b44570bd855dff15ac3c7c11fd18982102258c1ec8941a4eb04b2ecdafa01b8f9fe39e65e40adb8d9a5d972da57a3e7643a518b890845160ca42419e8ce1261a855638e6db7a188c04a68b2afaa9de470283922bd6beadc9ddff314516f0c4e39977f97d79a291bf9d626b471d8bbfe0668cdde8f54a24f31d3928e4e659caebb403902cb27d829bbff401e533bc93d406b6a7113c91d680d424d679df00b9694cfe497cbdabd16841aa1b08e9076ffca9bed761455324fd89338f6cc3223b79a46c8e52aca9a4408edf745c3a02ff52e5314d2f2ecd88d91a45a906bb21dbfe490ca8691dce636424694cdfb7c3cc9e354148b852c52a99d59012bb80360e11d92e9ce2220776f21cce91ba2c1a0c9bd456fad2c17a62bc1ae32ae189b7baf5eafdd0903a02d74e8027c8e884127d0b94ef12e940e3ca65b3d174ba25201b28fe6ca36189e7ed93a6985859463e2d35411957e5c24aa474bac60844aa2828c3c0f8e9199b143ebcd7d56a28794ab54dce479cfe2989838b3fcbfdf146e85cc6176ab35c0da942b5d9351a2fb87266b4870124e38305583bd0e838b31bcaa54ce0c724fc99f2acc3b28d2095fdbd96b736d290bed4745a94b94c89489bed29116839d2ab6a152eadd2a30e71c3a014f41e1554ba238358ba1867e089dd6def8aee0ac338e6da5eb0d0c815c5991a9155ba3f73859eecf57024b5dd65c6d2ec31c9e7339f98ddbad954b121be83cef5cca1606c47e8e8a431615e0d75eface7772d28e3185cdf87581d3f8adf33784aa80880940d86ab881b22b971535f7b83a9f7015e86790dc2520eecf3d1abf1c0dd8c207a22a656b98cb6ec51d8791166d18ab1d6ed43c16050b136d7f55d42492af94d07b1adb562ef07f6a309d884ca55316cbd810905171dd8c6f9a36b855e907b302343d06f0a0d081ad3a710ee9cfc1abfe8005dab815cd26c13236cfa01a7c072e30bab37cc7ab2f3d23796c2a1202f30500a516633e8072483a6d44bdd8fae4622c7e58f083bd70b97f4db8e9bd907be321737b61f18ae1a4d14366131e641851bffdabd5b22e5b731f4c65283ee5403bc31317045372a4fbec67d26df95e0a14888f2bdcb440cd42de4e0bf389a393fc318e18d393310d5aa3778df0fdca87a5801e5e5b891adb64646011f7693b4b0e9b1cbfa1fbc847f9939271c19b8fb4fc9b15b9397a7e221987417ba13a9fc2902ac3a1d58d65b58968df285ad3b3875949857a67d7b33dc1861bd18383428c9ed41c474f3f316c0df272c55806f4454460e64c37adaff5d712ec376ae5d0d1e91bd3bbdf2a0a5507429d53e13de0562a5ba4b02103c12dab0bd4b85bdd290b98c7e1fd9f494501d2c4b824c007f67bc2e8993d4f163b40515da8f2111f4fa519230713844d170f12b4077324312da2ca1c51c8fe1fff0d6dd68eeebae22ad6681a5f277711db0064d3fa25d09cac0e4b280b58c150e73b3885ab3964837cfc34cb29e215bade71b45e19505b356bf8de9f69c4a3741ab016f77a55869edd76bb33edc34a68959c37bdf60926530d3284688aeb17a347251d5501c034dd3902eef528f167cfc5913d02c430d76b50a6860eb84ee5eca2458ce862ad9fcda642b8df177defe8abacebb4bda07c040b4ccd773fd5c9026ac98243ea2a00f8760a2dacf1c371589b7e32f2d2094543a7d87414813f54ab98cf738ed3b3c1f9e9fdc4fe97bab52d172fad00dff94b0b72fa87b2a3372c8fc9af326f4d05ca131dc254d378eaaf2da3aada8815fedc18d252d95629f7b455cfc54983c2f042e5dd2c22d0f70addcc45c03fa3a52e0937e9590722cedcef23401824dd3f2537d28fb10ff13f6e9641c23075a5ca68125e67df28b3231a65d32a97f00117020debb14e19511acbb52e56be81595d8e74eab72e36b8dfc37678c309bb84221e480c9348f6977f8e3f8a47421184276eba93e84e8b7e2105a5a89c08708c0eb8ba7bfe4dd715278be217fafde8047652ab69544bc2d63d72060ac40f104bc5b509b7501ae7ea36e0d19149645d15b5abc68fad73a542662b3df07ab506746d7343e405370238b657cdb960223752b62e86758143474a78ff92696ad8b5c9d2637c8d9810cfa4faf2765efcd7a1a435a60bbf5962223b1fb0975e227abdc7bf80e3adeabc6ead120922beabd707e6d7a42e233c0788c680190e9ffaf0cc145c010c33438121e8206e25342413dddd02ff2c2e4e5299a82e8e85d181148e1e98db886103810230c6a8687de33c4cf7753c333b8d7b6b6b1a18eab53cc395104818709fc11f4995e057d4517828dcb5a9f3baf41ade7101ef40df27c680c8bcbe8bf2368f1d19b46036bf8419516789dc69ee2573ddec41d9ca00fcc710f5635afcf088e0107fb09a87db9ca6fccd0655ec0816ead48371d64e8318b767b95ed6ea89ff919c68cd33cdfa0381b8b7caa545de948b8c46bb879c4470feed0a990056fb2db739225fc768e83d15568d73694e6888da65870e79c4f5e1287f1a8cce359f82c9860e13ff900833dc556d8fd005c38a855ed1efec66b4ba8d1e65db9a999e172101062081354625cea8f1ac0da70d7f2dca34c4204dfdefe456822ae2cd1349f1a2251292ddbb287c5b9ca41c75f45bb4ddd82c277afd37422cc00fe8b7221168b04b6275f8e530757c673b3f515059f8c8421872d07a156a9d061bdbe0c549a52acfb0708682a2573c259225d0e95a16b8d13dcec60ae91c09537e8bea549f748d2e060d8ef856bb496a53f1cee7a7b716c95e7310ff9fa56180f0259df99b5fe06c030015d9cb5bc9ece0cd907d724e1d1a89d3d875970bf144c58260c0dde163a26d4769b33f6de7f181ecabc050797a105fd1ce73ac4d26a153297305b8a3c150beee4b563f468694cf3895c44df56fc8753e3c8182e8e3c9da0314eac9c288978847b92015ddc5711c09210e1f5a684b7f1f149fb0fe8471c30f8a35a58ffc6e2fb797acf9c686fbb8d1ee8d6dac14de44c22a3cdda239235c24ff23de17228aeb354939a80e4a1397b316da5e18f077cc7b8497df214290c33c4b8593db1ab1638698059f29477a091b070f139b3fd2fe3ff55803b6e65abe6dae32eddb18e898e63743ed256801c8bbbf26e21bdff9491ef743341a5159b36b616ea9c700aca9b6486278c7811729e3df91147ad0e25c44e03c9f4b2385aa6cbfc70d8f68d17ac0925d8fe8737b212f708633bacda57b3848667a4f624a4c7edd33a060f82aabe6ac6a19a81a2cf6403189f08d2632260d72630da6ffe46ab9c19456e95e3cfc423940023ba0ad6f1fe2a8755509441e248b291e02e85f7173054ec6597cc712e80751b4078bf8db1177130f0b170be8f3ac79d579e012caed707156f3ba28ddd5ca5d18320fc9f361e88aa93de9127752ea04c7c77425ad30522dfb5f1f10f802c1a9668812ee9e6b4acab25e10dfd2b18387e9f6ac725cd72f5100b6c15265dcfa1dd45f538b76346209e6cab4441013e36e861ae677e980ddd08e9366426f410428b9b0828c9805bcbb667209191e79305ecc15ce9cf30aa829373e4a8152e2c68294dc71b6ab7b551addc661a5a040ca7b79993cf1060c8410fac1e9d3b209319f22c4bab53b1a6585ebb72a579dbce64b107b280b529439cde9d1fa29333ce63dbfd693e0b2fb3633e37304e70fd5b8d04bf47f6630cfdfbf8ad9f7778c88d7ca9705f4694b1d3355c8406adc99e15bb39fdaa8df214e1730b6d05bd5f93349ecbf5b0db04a5fb1bd66c5bc30671a564d46fbfceacc074bb14c31d471593172ffe28c39912ece3f718864ab9e300ca172a7ebfad6fe28a0ef5aafcd3f966a5d7d4d6ff164434b649cfe149505159018d8c00e82afaf7657402109549f7a5a4c8c7dd02d7d2b005a3be97f0a32bdf3d8e449fb4146c9e38a509781246d9fb67ed087148fd8b8fa1abcc5771148c0483aca397b36302459ae43f6f5aff98bd784b8a1e19a05acc632672bdabb32f2aa4d66ba731d6e219d880f4ceb63d30ee61e5e13919352ee32254d48bab3566e13788689e35c3e4c71c244c34b457fa8a23248b9be6fa195a055137a587e73afd4ee521af95040e72851d3b6c06a15c3464c755cba079f1f53d807bedd0382e36c975793bf3f78690cf408a7c502b872a05a5988e6a96b0aaeb0c0075576f295e55a9002caecab04331d06cb042cbe87375e557933e3d5e8763baffb71bab63343e432f62e82bc51b4bcbb8fb93c72dbe0ee310bd0d776109700007d0a1bcbf1655e1354f2f5dbae7d2d569b099003347f9c3f6c5ceadfb113ae3daea860f61e233e68c63386ecafe74c1a7386c97725bb650f298c06ad648662940daa3abf0c6f460bd2875984858a97c1fa921d2a73f6d207163cffb573dd59ef815605824d3e44eb74e22e865c975b5d8b923b063934960d62fa9907baa28c9f0a24f1e5bf731eabe1f6b076ae19b150d5632b307de0741116d5af8c5b4dae3c8ae01808d1a9925cf185c55a335820c1d8b80736bec9a9562d269ff273a040d77babad128d2b71a64d084dd93be96e3b99ffcc037a6db0f296f63438c83789e54635e0c69fe3ebfd3022130523ffa6f2805747b4e97c2fa38e04decd1b037123814be9a38d322d342d07baa37d5b484c32517b74fc636441a08d8424aaeeefb6bb47a8c010d6f1442a6632e808520308ec7ce7f7607ba18cd8b897ca3814834b2f088cde073d93261dac3bb624bcc6839d6249b51a58fcc4db00058484e0c5814004c5da1d4cda1c025883c999fd2ef171a5c3a438cc0fccff03bae681775421d49ddbfb4f74ffcf88992abd6168e58295b91e7cbd442bbf8d7cfb5d3ce080dc2b90961edbca462e843343d129e45cfa28eeb426eeef08a5ee84d7b48c59a6687b8c0f7549375033398a65eb6336e40423c12a55b5bf732a65bcaae27a91fde89318727cd769c0cbece6371b611a0b40a6b14aa40ceb5848b738c13258fb0765cf83d92a2081d3c363cd7d48da0f0b19e884045c44e78bb61bd673c4522e1c50a2a944115a57f4670b8c388858c7f4babae8052ff86f2b6b780e3b1b5e4302fe7aa7321b3a45ae98ba5a74e87ef4cf13046c7b67bff56f9ff6f4224c4d24bd438eb92e3a1a786c50b6d1dbb302b237618ad008fa5aba8c4778ec3735dc483adc99d19ce1c87634d5ff86f06acece91c7a79e1400b6b483285c8e478f43c3fdf22ccf792aec034ffd47e60080e7d4a27b6e48bb0a15aed15d6b84e9b6af83d4de502d70026533db7c881d0b344ce7b732fbb69348aadf44b22dd3921f8eefd5ef2914a7eac8d36b5420163258fc2be1d34bbf49ef5c4c7ad6a09c7292690f569621bfba1c4d9e484acd7d92f58b79bde01dd6ba98f4cad801e902bff0e81ae787c595969187b58ed9bf68b0aeaec069b64f6facbf7f0a4a8a5d3fc401c0e1ac3bef9bafa512e36d5c8d8b135f1a05368255c15b1c976ae93c9c99288fecf018505eed0f089aec2a9ca7b198a0a89671f095092d2a9e7fb90dde3bf586a2f168f2a8329118d04bffb6adabd53f87df50275981c9fd5d69020c8e9750287e5119c1cf347d1c3e4adba1d598446b4c0a479a5475859383e8c82bfe4c6b8560ad55e27f3323d857efcad4b5ee4d83b4dd74458414d2a9ce74ffda8042038caba0098bcfd6b2e2bda9afcc4c5890f38773726aa94791642ff492f8d11c736f397c080d63e2dd24baa37aff0ae46d9c77c5097f84d6e5a90c554436cfa5311e4f31e2386c2c4b04cf44fd118b4eee2326cd1f0a48efeb4c51fbe0f395694b2b40aca9fccfc1eb84283fd53671955b251bcc2253ed3a3fbb906b2b25944fbe6c5b226b05052fec7c9e6b2d4c0a1ae1029ff70900d4634954f025a345731a76ebcfc4e61499d91b888292e6c59a16c34e4d96ac23dbad628988fcb777c4e9c6348389decbce8c9c03420c01bd670280ce1d4d641d2d4b9c3c11ade9d196f8e49290094ed55382b09f0cf0397ffcd9006e38980ee0b3882e7d93e33643c1ed2429cbefba0e1720f69a20024aff6070acd25a3d68b129e3d7699641d20c5b93e8d4b784669e3a22727d687ff1dadfd19c5b44dcf776561eecf2d28c01e683f49b1c204ba45aadf5d84bdde7d2cd53dad97d060664ddefff75f5e413f72be41d6e7c13fcbc481eefdab31fbc500109c8c24756227ff5bb18b148d0a31576d2e427c43472624312a7568d5ad9b5f9a2274549e5180288dbc0c7e046766c174fca0aca1d867fce966bf4d1097efe62ae23c925ac387b368345999a92cd1d44055e178430fad19cbf8b53756df5584503d848e13ab90c338c2aa8346e2b499e5790926cbe359dc30a3d5336293c4990832e998c2901fae3df81ad4f1ec6fd17baf25fa25fa08bb71345a1fec99299e4ee962dab091c16138fe01d5403230fd896b0992a2474fe38e5a7ff15b372e2a7a4a0ff34defe1fba14bfb6f56630aaef274b57fd0999bf77aa79f743e29c60b7d5d1774ffa9591286f809ea6c0dcc1520f5766851e0f9233b4a2e1329e93e043837510f5ef85676590b0540aa7b2b5211d7d38fbc45e2fe3d7993c6bec4ba2205a40819f8a3ef2e71af85162e39f0f859ed446947bc8516eb527c496244488f8663dee31973d91c7be81b746cde97294cbf94e09d155354af76ecac1d968038ed961843350524dbfd6ff46e4e0991aed94c144a403a5be126279a6469f9b7854b839933163c83672275491445ccc81bcabf91a6851101593bdfa0930e1058c972e7e41ad390cc4666575ce29fa80095eceb4cbb035e7e7e5a02be4606004e176db167fb67889912b8381e311c39d4378a088328f3e2cd4733dc55fc2e5a0afa7c928b98f95187a7200d8f78a2619df22a4f9fb433fb4a3a848651abfa90adc22c3bc29c1c386c0bc168c0c7873719f3cd76c49c77a5624a288022ebc89998c94f3bad87cd8bcd58502c38b0ff7ed312614f65ca1ea2f999fdcf2432e49b56c635f78514d9be0a5416e2b1ca8aa1b6f6c15d4ba022e5486afb79935d7021eea7b5d8e41a52b514af162a8b79a65efded6720126b9a5b3965f672d8da1bd9692bc14da0b29bc052e9ad22a59edbd0cb3c71fc304b0b8e296cdde1b259ac35a2e30e0741ec6a1cc4699d956959cfdfe4a91f6460271a70ba883f1b8eb3c1f52c60c361696056a411b74104960528caaa338066d823eec164c9c69d7b80c4d0c2ec7a739155c913810b3f5eb147e89e3b8699a29ca192f20cf8db8a1d7c01cbffdceb9d1a5045f55c8328966b91ee2b8e373d35ce74d35c1bea66316a2c0ea561844dcd6a027c6991038623ef894ed3489b4e04ab7e116973380fff9066eac58a406f78c4656367b57081f7b99030b0b087cbac6fd705d2d135ae4505ebb3c8b5ff3e226c9aa8896ba16600ba3dc89b73f07f9968a05045b34218a9f14a3e507103916f3a0b1f8989ab057b8907041cc1c31905b6e87f10e74e4c196c17e31450419040df59bee49aa554f9661f38435effa292f7ef01cd6173e08a3186f04018c23f37b7953c3f5ca7f83389ccbd539405ace7abb99aa29537eedb79000ee04fe5b72999ee606238874f0fa1b14d8cfc9d9c0c1a1666ca7ccceaefe1cf583157ae6e7dbd70425f487340386cbd141261ecc838482daec473b685e6ec71a23c42fbe89521360d6c6ed42284627655d2eceb9cd0f65df549b0c4efec101dd359ddb53dc99d94df991093459f7842c878b7b49fff2cf850bd924a06d3a3a420ee82dcb39e487c0f61de92ae6f0c8d12cdcc7365f2bee4300ac3842188ec82c76164c33c1d11362c1d9e136e516ae0b91172e252f73958be0913777a29be7da26ae2f7ba9e2a80a67974fe30fde3f6b9aa0b21aedbe0f23f074f962ee846d64116eb14d886ad4aa4166c779e6bf3e7d5ee3d7ff2519351f07595531ac10da596268f65434d9a4779fd8c326a847a44d0ca1cb1d1e764a56c99df167901695de6f07ffa94edf874233b340a524449b19f4cda7712cea4c7e0fcd7879edeec3ea24073354e31989ed1c08bb4bb1bec053c4c6fd352b0c91007623635619e05375728bf575f2e26bf617644f0239123f8ac1ed06767ca7b3096ec91ec1d530b7a0ec855a341ba4f72fdbd40cae0727581dfaf25b00282131bc82b5c44d4089b0b3274520a40c0053b5dd10e59a811023b660ffcb2d7e79b32af9f55ae030eb845a64361d25b175cacb07389957f23c9ff3e52e2bea41a75305377af233336d9a7bf7f9939441b76898b9aa8a596e9261f71c5176aae31270d80576885119fa6324856f1ceef3c6cb2db8a10aadea3c801c267e9987afa360958514bc85bc69c6d59211bbcf2b1312399f74f340fdf10a19145f0129d9cccfa4194bf148493db3a01b81f19aeca63e1074d94cfbb289ba9823646201ce9eb234167086a90241bfaf57c3216fcfcaf39824ff97545135f42c443b65b6369349d89de333fd015507c3a03cd3ee5253abd8fef6fe2248a002f9c70a51ddb89e7fe476163c6b1cce417be229b0e5533b81088370f7ec9468ee0de1f6feedb371dfa850ea5fe35c83ee58533c52a7c758c7adbb0329b3d7b4180be6df7f1d1881fad5a52cd807922d7eaddb13fa65cec8684a2321a4d923fc3fc657bf2ff3c02ffa6845f2eda3e736bed70e6984387cf77531b2e6ac6d67c706f43bb3944b618851abbff019ad48d116a7ca56fa436a58adc82dd5f8cc63fcd56076442ca88e3b3702ad99d6e2c46a561b87c5ac8a94ad77100be0c5d80887ba1283f38017b421c6456ac90bf90c8ce31d011ab997db7215520dda972ff1a78fcc5122e140e51a20bd361566276ae614643344e5b395bed67d8bde8957429c6ffb9147ad00d99ed2baa6766feb100c8b2601fa5f34f6428b9cec3262ee29dd220642df5fdcf2e43cf72ce7c710cce7de6099d76bf0d01f68f60d9fec99f69c0db0465ab3cf4e7a623676dac5fee48f55059140139bc210b1d5a9b2dae02eea4b799f36142286ff85ebffe76ee562d3af670c78633cf314e4d8792a8c6eb40bed1fd7d99603b22f216e260cc7dd59eb226b2a59d946c02b5458e358470be9e8c4fcd5f6403bebbd5de5421f082b39fd77cd590ad96d5ff7d3f1ac38f244742662726cfe70909d04867c869332ded36bac3f819fe173dd7f", 0x2000, &(0x7f0000000b00)={&(0x7f0000000080)={0x50}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r0, &(0x7f0000000e00)={0x50, 0x0, r1, {0x7, 0x27, 0x0, 0x23072d}}, 0x50) setxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000000c0)='./file0/../file0/../file0\x00', 0x0, 0x20, 0x0) syz_fuse_handle_req(r0, &(0x7f0000008300)="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", 0x2000, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x78, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x400000, 0x0, 0x0, r2}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) 24.071093115s ago: executing program 0 (id=417): sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2c41, 0x0) flock(r1, 0x5) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r2, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r4}, 0x10) 11.977300977s ago: executing program 0 (id=418): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'essiv(cbc(aes),sha256)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) 4.705400028s ago: executing program 0 (id=419): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0xcc}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x7fd, @loopback}], 0x1c) sendmmsg$inet6(r0, &(0x7f0000003c40)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000140)="03", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)=ANY=[], 0x1000f) 0s ago: executing program 0 (id=420): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) write$binfmt_elf32(r0, &(0x7f00000014c0)=ANY=[], 0x46b) sendmmsg$inet(r0, &(0x7f0000000f40)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000006c0)="ed", 0x1}, {&(0x7f0000000200)="b5", 0x1}, {&(0x7f0000000340)='.', 0x1}, {&(0x7f0000000140)='U', 0x1}, {&(0x7f0000000180)="f3", 0x1}], 0x5}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000580)="f1", 0x1}, {&(0x7f0000000c80)='a', 0x1}, {&(0x7f0000000b40)='M', 0x1}, {&(0x7f0000000d80)='o', 0x1}, {&(0x7f0000000e80)='\b', 0x1}], 0xa6}, 0x70040000}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)="bb", 0x1}, {&(0x7f00000007c0)="a1", 0x1}, {&(0x7f0000000800)='s', 0x1}, {&(0x7f00000009c0)='\\', 0x1}], 0x4}}, {{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000440)="88", 0x1}, {&(0x7f0000000840)="e5", 0x1}, {&(0x7f0000001040)="96", 0x1}], 0x3}}], 0x4, 0x4048841) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="18020000004000000000000000000000850000003d00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=@base={0x12, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB='\a'], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r3, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r1}, 0x20) sendmmsg$inet6(r1, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000ac0)="b0", 0x7ffff000}], 0x11}}], 0x2, 0x0) kernel console output (not intermixed with test programs): xt=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3538.646595][ T30] kauditd_printk_skb: 101 callbacks suppressed [ 3538.646810][ T30] audit: type=1400 audit(3538.050:21223): avc: denied { search } for pid=5270 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3538.706127][ T30] audit: type=1400 audit(3538.110:21224): avc: denied { search } for pid=5270 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3538.766279][ T30] audit: type=1400 audit(3538.170:21225): avc: denied { search } for pid=5270 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3538.892718][ T30] audit: type=1400 audit(3538.300:21226): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3539.212787][ T30] audit: type=1400 audit(3538.390:21227): avc: denied { search } for pid=5270 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3539.213924][ T30] audit: type=1400 audit(3538.430:21228): avc: denied { search } for pid=5270 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3539.214787][ T30] audit: type=1400 audit(3538.470:21229): avc: denied { search } for pid=5270 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3539.215641][ T30] audit: type=1400 audit(3538.490:21230): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3539.216418][ T30] audit: type=1400 audit(3538.510:21231): avc: denied { getattr } for pid=5270 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3539.288026][ T30] audit: type=1400 audit(3538.540:21232): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3544.512036][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 3544.512245][ T30] audit: type=1400 audit(3543.920:21265): avc: denied { search } for pid=5272 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3544.559412][ T30] audit: type=1400 audit(3543.950:21266): avc: denied { read } for pid=5272 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3544.593969][ T30] audit: type=1400 audit(3544.000:21267): avc: denied { read open } for pid=5272 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3544.789172][ T30] audit: type=1400 audit(3544.180:21268): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3544.869527][ T30] audit: type=1400 audit(3544.270:21269): avc: denied { search } for pid=5272 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3544.949257][ T30] audit: type=1400 audit(3544.350:21270): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3544.954384][ T30] audit: type=1400 audit(3544.360:21271): avc: denied { search } for pid=5272 comm="cmp" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3545.038621][ T30] audit: type=1400 audit(3544.430:21272): avc: denied { search } for pid=5272 comm="cmp" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3545.040074][ T30] audit: type=1400 audit(3544.440:21273): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3545.118465][ T30] audit: type=1400 audit(3544.520:21274): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3553.117158][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 3553.146319][ T30] audit: type=1400 audit(3552.520:21290): avc: denied { search } for pid=5274 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3553.169006][ T30] audit: type=1400 audit(3552.560:21291): avc: denied { search } for pid=5274 comm="rm" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3553.189187][ T30] audit: type=1400 audit(3552.590:21292): avc: denied { search } for pid=5274 comm="rm" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3553.272399][ T30] audit: type=1400 audit(3552.670:21293): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3553.358177][ T30] audit: type=1400 audit(3552.750:21294): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3553.373719][ T30] audit: type=1400 audit(3552.780:21295): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3553.439477][ T30] audit: type=1400 audit(3552.830:21296): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3553.480115][ T30] audit: type=1400 audit(3552.870:21297): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3553.769711][ T30] audit: type=1400 audit(3553.170:21298): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3553.910299][ T30] audit: type=1400 audit(3553.320:21299): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3558.420169][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 3558.420348][ T30] audit: type=1400 audit(3557.820:21304): avc: denied { read write } for pid=3277 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3558.574293][ T30] audit: type=1400 audit(3557.980:21305): avc: denied { read write open } for pid=3277 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3558.820110][ T30] audit: type=1400 audit(3558.200:21306): avc: denied { ioctl } for pid=3277 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3559.281262][ T30] audit: type=1400 audit(3558.690:21307): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3559.549979][ T30] audit: type=1400 audit(3558.940:21308): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3559.625413][ T30] audit: type=1400 audit(3559.030:21309): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3559.748424][ T30] audit: type=1400 audit(3559.150:21310): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3559.922106][ T30] audit: type=1400 audit(3559.300:21311): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3560.237098][ T30] audit: type=1400 audit(3559.640:21312): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3560.417847][ T30] audit: type=1400 audit(3559.790:21313): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3563.531212][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 3563.531381][ T30] audit: type=1400 audit(3562.910:21326): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3563.771242][ T30] audit: type=1400 audit(3563.180:21327): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3563.898275][ T30] audit: type=1400 audit(3563.300:21328): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3564.156920][ T30] audit: type=1400 audit(3563.560:21329): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3564.396155][ T30] audit: type=1400 audit(3563.800:21330): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3564.922392][ T30] audit: type=1400 audit(3564.330:21331): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3565.038824][ T30] audit: type=1400 audit(3564.430:21332): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3565.106466][ T30] audit: type=1400 audit(3564.510:21333): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3565.407931][ T30] audit: type=1400 audit(3564.810:21334): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3565.535503][ T30] audit: type=1400 audit(3564.940:21335): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3568.604672][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 3568.604784][ T30] audit: type=1400 audit(3568.010:21358): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3568.699606][ T30] audit: type=1400 audit(3568.090:21359): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3568.783255][ T30] audit: type=1400 audit(3568.190:21360): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3568.994772][ T30] audit: type=1400 audit(3568.400:21361): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3569.588608][ T30] audit: type=1400 audit(3568.550:21362): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3569.590185][ T30] audit: type=1400 audit(3568.650:21363): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3569.591246][ T30] audit: type=1400 audit(3568.730:21364): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3569.592039][ T30] audit: type=1400 audit(3568.810:21365): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3569.765867][ T30] audit: type=1400 audit(3569.170:21366): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3569.936420][ T30] audit: type=1400 audit(3569.340:21367): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3573.942327][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 3573.942429][ T30] audit: type=1400 audit(3570.920:21371): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3573.943525][ T30] audit: type=1400 audit(3570.990:21372): avc: denied { search } for pid=5276 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3573.944272][ T30] audit: type=1400 audit(3571.030:21373): avc: denied { search } for pid=5276 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3573.944989][ T30] audit: type=1400 audit(3571.050:21374): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3573.945767][ T30] audit: type=1400 audit(3571.070:21375): avc: denied { search } for pid=5276 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3573.946498][ T30] audit: type=1400 audit(3571.110:21376): avc: denied { search } for pid=5276 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3573.948143][ T30] audit: type=1400 audit(3571.110:21377): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3573.948884][ T30] audit: type=1400 audit(3571.210:21378): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3573.949656][ T30] audit: type=1400 audit(3571.270:21379): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3573.950400][ T30] audit: type=1400 audit(3571.450:21380): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3578.978238][ T30] kauditd_printk_skb: 46 callbacks suppressed [ 3578.978358][ T30] audit: type=1400 audit(3578.380:21427): avc: denied { search } for pid=5285 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3579.012501][ T30] audit: type=1400 audit(3578.410:21428): avc: denied { search } for pid=5285 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3579.050377][ T30] audit: type=1400 audit(3578.450:21429): avc: denied { search } for pid=5285 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3579.118518][ T30] audit: type=1400 audit(3578.490:21430): avc: denied { read } for pid=5285 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3579.129768][ T30] audit: type=1400 audit(3578.530:21431): avc: denied { read open } for pid=5285 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3579.158616][ T30] audit: type=1400 audit(3578.560:21432): avc: denied { getattr } for pid=5285 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3579.223363][ T30] audit: type=1400 audit(3578.630:21433): avc: denied { search } for pid=5285 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3579.248563][ T30] audit: type=1400 audit(3578.650:21434): avc: denied { search } for pid=5285 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3579.299208][ T30] audit: type=1400 audit(3578.670:21435): avc: denied { search } for pid=5285 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3579.300070][ T30] audit: type=1400 audit(3578.690:21436): avc: denied { search } for pid=5285 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3583.992948][ T30] kauditd_printk_skb: 124 callbacks suppressed [ 3583.993067][ T30] audit: type=1400 audit(3583.400:21561): avc: denied { search } for pid=5276 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3584.016813][ T30] audit: type=1400 audit(3583.420:21562): avc: denied { search } for pid=5276 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3584.048195][ T30] audit: type=1400 audit(3583.440:21563): avc: denied { search } for pid=5276 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3584.071971][ T30] audit: type=1400 audit(3583.470:21564): avc: denied { getattr } for pid=5276 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1950 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3584.109483][ T30] audit: type=1400 audit(3583.500:21565): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3584.198575][ T30] audit: type=1400 audit(3583.600:21566): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3584.488546][ T30] audit: type=1400 audit(3583.890:21567): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3584.698188][ T30] audit: type=1400 audit(3584.100:21568): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3584.768264][ T30] audit: type=1400 audit(3584.170:21569): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3584.878265][ T30] audit: type=1400 audit(3584.280:21570): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3589.046941][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 3589.047033][ T30] audit: type=1400 audit(3588.450:21596): avc: denied { create } for pid=5293 comm="syz.0.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3589.220382][ T30] audit: type=1400 audit(3588.630:21597): avc: denied { write } for pid=5293 comm="syz.0.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3589.602349][ T30] audit: type=1400 audit(3589.010:21598): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3590.029071][ T30] audit: type=1400 audit(3589.410:21599): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3590.031359][ T30] audit: type=1400 audit(3589.430:21600): avc: denied { read } for pid=5293 comm="syz.0.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3590.090382][ T30] audit: type=1400 audit(3589.480:21601): avc: denied { write } for pid=5293 comm="syz.0.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3590.280987][ T30] audit: type=1400 audit(3589.690:21602): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3590.460773][ T30] audit: type=1400 audit(3589.860:21603): avc: denied { read } for pid=5293 comm="syz.0.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3590.579287][ T30] audit: type=1400 audit(3589.970:21604): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3590.934785][ T30] audit: type=1400 audit(3590.250:21605): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3596.174299][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 3596.174503][ T30] audit: type=1400 audit(3595.580:21630): avc: denied { search } for pid=5299 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3596.233030][ T30] audit: type=1400 audit(3595.600:21631): avc: denied { search } for pid=5299 comm="rm" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3596.234433][ T30] audit: type=1400 audit(3595.620:21632): avc: denied { search } for pid=5299 comm="rm" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3596.712567][ T30] audit: type=1400 audit(3596.120:21633): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3597.109926][ T30] audit: type=1400 audit(3596.220:21634): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3597.111597][ T30] audit: type=1400 audit(3596.280:21635): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3597.113034][ T30] audit: type=1400 audit(3596.340:21636): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3597.114415][ T30] audit: type=1400 audit(3596.370:21637): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3597.115741][ T30] audit: type=1400 audit(3596.420:21638): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3597.117066][ T30] audit: type=1400 audit(3596.460:21639): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3607.373206][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 3607.373365][ T30] audit: type=1400 audit(3603.380:21663): avc: denied { search } for pid=5303 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3607.375320][ T30] audit: type=1400 audit(3603.410:21664): avc: denied { search } for pid=5303 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3607.376624][ T30] audit: type=1400 audit(3603.510:21665): avc: denied { search } for pid=5303 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3607.380181][ T30] audit: type=1400 audit(3603.550:21666): avc: denied { search } for pid=5303 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3607.381581][ T30] audit: type=1400 audit(3604.660:21667): avc: denied { search } for pid=5306 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3607.382852][ T30] audit: type=1400 audit(3604.700:21668): avc: denied { search } for pid=5306 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3607.384130][ T30] audit: type=1400 audit(3604.740:21669): avc: denied { search } for pid=5306 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3607.385443][ T30] audit: type=1400 audit(3604.780:21670): avc: denied { read } for pid=5306 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3607.386820][ T30] audit: type=1400 audit(3604.820:21671): avc: denied { read open } for pid=5306 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3607.388938][ T30] audit: type=1400 audit(3604.860:21672): avc: denied { getattr } for pid=5306 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3613.288131][ T30] kauditd_printk_skb: 105 callbacks suppressed [ 3613.288235][ T30] audit: type=1400 audit(3610.760:21778): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3613.289521][ T30] audit: type=1400 audit(3610.830:21779): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3613.290405][ T30] audit: type=1400 audit(3610.870:21780): avc: denied { search } for pid=5303 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3613.291264][ T30] audit: type=1400 audit(3610.890:21781): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3613.292132][ T30] audit: type=1400 audit(3610.890:21782): avc: denied { search } for pid=5303 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3613.293026][ T30] audit: type=1400 audit(3610.910:21783): avc: denied { search } for pid=5303 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3613.293964][ T30] audit: type=1400 audit(3610.950:21784): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3613.294808][ T30] audit: type=1400 audit(3610.980:21785): avc: denied { search } for pid=5303 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3613.295710][ T30] audit: type=1400 audit(3611.000:21786): avc: denied { search } for pid=5303 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3613.296547][ T30] audit: type=1400 audit(3611.020:21787): avc: denied { search } for pid=5303 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3619.267201][ T30] kauditd_printk_skb: 72 callbacks suppressed [ 3619.269239][ T30] audit: type=1400 audit(3618.300:21860): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3619.270144][ T30] audit: type=1400 audit(3618.410:21861): avc: denied { search } for pid=5311 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3619.270954][ T30] audit: type=1400 audit(3618.430:21862): avc: denied { read } for pid=5311 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3619.271707][ T30] audit: type=1400 audit(3618.450:21863): avc: denied { read open } for pid=5311 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3619.272450][ T30] audit: type=1400 audit(3618.460:21864): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3619.273182][ T30] audit: type=1400 audit(3618.500:21865): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3619.274028][ T30] audit: type=1400 audit(3618.520:21866): avc: denied { search } for pid=5311 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3619.274776][ T30] audit: type=1400 audit(3618.540:21867): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3619.275545][ T30] audit: type=1400 audit(3618.540:21868): avc: denied { search } for pid=5311 comm="cmp" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3619.276276][ T30] audit: type=1400 audit(3618.560:21869): avc: denied { search } for pid=5311 comm="cmp" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3624.292702][ T30] kauditd_printk_skb: 73 callbacks suppressed [ 3624.292796][ T30] audit: type=1400 audit(3623.700:21943): avc: denied { bpf } for pid=5314 comm="syz.0.397" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3624.311938][ T30] audit: type=1326 audit(3623.720:21944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5314 comm="syz.0.397" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x126d8c code=0x7ffc0000 [ 3624.323476][ T30] audit: type=1326 audit(3623.730:21945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5314 comm="syz.0.397" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x133470 code=0x7ffc0000 [ 3624.373292][ T30] audit: type=1326 audit(3623.770:21946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5314 comm="syz.0.397" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x133470 code=0x7ffc0000 [ 3624.380550][ T30] audit: type=1326 audit(3623.790:21947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5314 comm="syz.0.397" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x126d8c code=0x7ffc0000 [ 3624.418999][ T30] audit: type=1326 audit(3623.810:21948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5314 comm="syz.0.397" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x133470 code=0x7ffc0000 [ 3625.163388][ T30] audit: type=1400 audit(3624.570:21949): avc: denied { prog_load } for pid=5314 comm="syz.0.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3625.229050][ T30] audit: type=1400 audit(3624.610:21950): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3625.473950][ T30] audit: type=1400 audit(3624.880:21951): avc: denied { bpf } for pid=5314 comm="syz.0.397" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3625.485852][ T30] audit: type=1400 audit(3624.890:21952): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3629.341811][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 3629.341987][ T30] audit: type=1400 audit(3628.720:21979): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3629.595295][ T30] audit: type=1400 audit(3629.000:21980): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3629.717890][ T30] audit: type=1400 audit(3629.120:21981): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3629.794560][ T30] audit: type=1400 audit(3629.200:21982): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3629.861497][ T30] audit: type=1400 audit(3629.250:21983): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3630.223648][ T30] audit: type=1400 audit(3629.630:21984): avc: denied { read write } for pid=3277 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3630.288647][ T30] audit: type=1400 audit(3629.690:21985): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3630.429921][ T30] audit: type=1400 audit(3629.820:21986): avc: denied { read write open } for pid=3277 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3630.600766][ T30] audit: type=1400 audit(3630.000:21987): avc: denied { ioctl } for pid=3277 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3630.629205][ T30] audit: type=1400 audit(3630.030:21988): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3635.420369][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 3635.420460][ T30] audit: type=1400 audit(3634.830:22009): avc: denied { map_create } for pid=5323 comm="syz.0.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3635.542638][ T30] audit: type=1400 audit(3634.950:22010): avc: denied { create } for pid=5323 comm="syz.0.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 3635.603867][ T30] audit: type=1400 audit(3635.010:22011): avc: denied { search } for pid=5321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3635.634781][ T30] audit: type=1400 audit(3635.040:22012): avc: denied { search } for pid=5321 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3635.665758][ T30] audit: type=1400 audit(3635.070:22013): avc: denied { search } for pid=5321 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3635.718657][ T30] audit: type=1400 audit(3635.100:22014): avc: denied { search } for pid=5321 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3635.788275][ T30] audit: type=1400 audit(3635.190:22015): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3636.233052][ T30] audit: type=1400 audit(3635.640:22016): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3636.629198][ T30] audit: type=1400 audit(3635.930:22017): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3636.693519][ T30] audit: type=1400 audit(3636.100:22018): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3640.623189][ T30] kauditd_printk_skb: 50 callbacks suppressed [ 3640.623361][ T30] audit: type=1400 audit(3640.030:22069): avc: denied { search } for pid=5325 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3640.663254][ T30] audit: type=1400 audit(3640.070:22070): avc: denied { search } for pid=5325 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3640.709274][ T30] audit: type=1400 audit(3640.100:22071): avc: denied { search } for pid=5325 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3640.784553][ T30] audit: type=1400 audit(3640.190:22072): avc: denied { read } for pid=5325 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3640.878943][ T30] audit: type=1400 audit(3640.260:22073): avc: denied { read open } for pid=5325 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3640.955561][ T30] audit: type=1400 audit(3640.360:22074): avc: denied { getattr } for pid=5325 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3640.978440][ T30] audit: type=1400 audit(3640.380:22075): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3641.249038][ T30] audit: type=1400 audit(3640.650:22076): avc: denied { search } for pid=5325 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3641.289703][ T30] audit: type=1400 audit(3640.670:22077): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3641.321366][ T30] audit: type=1400 audit(3640.730:22078): avc: denied { search } for pid=5325 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3645.636881][ T30] kauditd_printk_skb: 101 callbacks suppressed [ 3645.637096][ T30] audit: type=1400 audit(3645.040:22180): avc: denied { search } for pid=5321 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3645.699931][ T30] audit: type=1400 audit(3645.090:22181): avc: denied { append } for pid=5321 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=1964 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3645.739182][ T30] audit: type=1400 audit(3645.140:22182): avc: denied { append open } for pid=5321 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=1964 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3645.931397][ T30] audit: type=1400 audit(3645.320:22183): avc: denied { search } for pid=5321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3645.954363][ T30] audit: type=1400 audit(3645.350:22184): avc: denied { getattr } for pid=5321 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3646.022017][ T30] audit: type=1400 audit(3645.430:22185): avc: denied { search } for pid=5321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3646.041396][ T30] audit: type=1400 audit(3645.450:22186): avc: denied { getattr } for pid=5321 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3646.073366][ T30] audit: type=1400 audit(3645.480:22187): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3646.129888][ T30] audit: type=1400 audit(3645.530:22188): avc: denied { search } for pid=5321 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3646.165444][ T30] audit: type=1400 audit(3645.540:22189): avc: denied { search } for pid=5321 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3652.048000][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 3652.048104][ T30] audit: type=1400 audit(3648.550:22216): avc: denied { read write open } for pid=3277 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3652.049655][ T30] audit: type=1400 audit(3648.570:22217): avc: denied { ioctl } for pid=3277 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3652.050649][ T30] audit: type=1400 audit(3650.070:22218): avc: denied { prog_load } for pid=5334 comm="syz.0.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3652.051468][ T30] audit: type=1400 audit(3650.110:22219): avc: denied { bpf } for pid=5334 comm="syz.0.401" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3652.052296][ T30] audit: type=1400 audit(3650.160:22220): avc: denied { map_create } for pid=5334 comm="syz.0.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3652.053112][ T30] audit: type=1400 audit(3650.200:22221): avc: denied { bpf } for pid=5334 comm="syz.0.401" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3652.053963][ T30] audit: type=1400 audit(3650.240:22222): avc: denied { perfmon } for pid=5334 comm="syz.0.401" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3652.054774][ T30] audit: type=1400 audit(3650.290:22223): avc: denied { map_read map_write } for pid=5334 comm="syz.0.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3652.055558][ T30] audit: type=1400 audit(3650.330:22224): avc: denied { prog_load } for pid=5334 comm="syz.0.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3652.056351][ T30] audit: type=1400 audit(3650.370:22225): avc: denied { bpf } for pid=5334 comm="syz.0.401" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3657.066739][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 3657.066904][ T30] audit: type=1400 audit(3656.470:22255): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3657.224518][ T30] audit: type=1400 audit(3656.630:22256): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3657.347147][ T30] audit: type=1400 audit(3656.750:22257): avc: denied { search } for pid=5337 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3657.500060][ T30] audit: type=1400 audit(3656.900:22258): avc: denied { search } for pid=5337 comm="rm" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3657.630164][ T30] audit: type=1400 audit(3657.020:22259): avc: denied { search } for pid=5337 comm="rm" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3657.656467][ T30] audit: type=1400 audit(3657.060:22260): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3657.972429][ T30] audit: type=1400 audit(3657.380:22261): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3658.096070][ T30] audit: type=1400 audit(3657.500:22262): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3658.198122][ T30] audit: type=1400 audit(3657.600:22263): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3658.348734][ T30] audit: type=1400 audit(3657.740:22264): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3659.443707][ T5338] netlink: 108 bytes leftover after parsing attributes in process `syz.0.402'. [ 3662.154971][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 3662.155185][ T30] audit: type=1400 audit(3661.560:22290): avc: denied { module_request } for pid=5023 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3662.473254][ T30] audit: type=1400 audit(3661.880:22291): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3662.649009][ T30] audit: type=1400 audit(3662.040:22292): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3662.921833][ T30] audit: type=1400 audit(3662.330:22293): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3663.118827][ T30] audit: type=1400 audit(3662.470:22294): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3663.446970][ T30] audit: type=1400 audit(3662.850:22295): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3663.779210][ T30] audit: type=1400 audit(3663.180:22296): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3663.929367][ T30] audit: type=1400 audit(3663.320:22297): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3664.109837][ T30] audit: type=1400 audit(3663.510:22298): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3664.309494][ T30] audit: type=1400 audit(3663.700:22299): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3668.231117][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 3668.231208][ T30] audit: type=1400 audit(3667.640:22315): avc: denied { prog_load } for pid=5340 comm="syz.0.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3668.325747][ T30] audit: type=1400 audit(3667.730:22316): avc: denied { bpf } for pid=5340 comm="syz.0.403" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3668.478281][ T30] audit: type=1400 audit(3667.880:22317): avc: denied { perfmon } for pid=5340 comm="syz.0.403" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3668.553232][ T30] audit: type=1400 audit(3667.960:22318): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3668.600303][ T30] audit: type=1400 audit(3668.010:22319): avc: denied { prog_load } for pid=5340 comm="syz.0.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3668.748141][ T30] audit: type=1400 audit(3668.140:22320): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3668.749550][ T30] audit: type=1400 audit(3668.150:22321): avc: denied { bpf } for pid=5340 comm="syz.0.403" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3668.868204][ T30] audit: type=1400 audit(3668.260:22323): avc: denied { perfmon } for pid=5340 comm="syz.0.403" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3668.869492][ T30] audit: type=1400 audit(3668.210:22322): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3668.933419][ T30] audit: type=1400 audit(3668.340:22324): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3673.429775][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 3673.429943][ T30] audit: type=1400 audit(3672.840:22346): avc: denied { map_create } for pid=5343 comm="syz.0.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3673.599680][ T30] audit: type=1400 audit(3672.960:22347): avc: denied { bpf } for pid=5343 comm="syz.0.404" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3673.688612][ T30] audit: type=1400 audit(3673.090:22348): avc: denied { bpf } for pid=5343 comm="syz.0.404" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3673.758777][ T30] audit: type=1400 audit(3673.150:22349): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3673.840781][ T30] audit: type=1400 audit(3673.210:22350): avc: denied { map_read map_write } for pid=5343 comm="syz.0.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3673.944605][ T30] audit: type=1400 audit(3673.350:22351): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3674.043596][ T30] audit: type=1400 audit(3673.450:22352): avc: denied { prog_load } for pid=5343 comm="syz.0.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3674.079154][ T30] audit: type=1400 audit(3673.470:22353): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3674.130915][ T30] audit: type=1400 audit(3673.530:22354): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3674.211035][ T30] audit: type=1400 audit(3673.620:22355): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3678.972279][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 3678.972453][ T30] audit: type=1400 audit(3678.380:22377): avc: denied { module_request } for pid=5023 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3681.329811][ T30] audit: type=1400 audit(3679.640:22378): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3681.331557][ T30] audit: type=1400 audit(3679.720:22379): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3681.333015][ T30] audit: type=1400 audit(3679.800:22380): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3681.340018][ T30] audit: type=1400 audit(3679.920:22381): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3681.341503][ T30] audit: type=1400 audit(3680.080:22382): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3681.342778][ T30] audit: type=1400 audit(3680.430:22383): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3682.028429][ T30] audit: type=1400 audit(3681.410:22384): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3682.225261][ T30] audit: type=1400 audit(3681.630:22385): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3682.829249][ T30] audit: type=1400 audit(3681.860:22386): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3685.154575][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 3685.154746][ T30] audit: type=1400 audit(3684.560:22392): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3685.612235][ T30] audit: type=1400 audit(3685.020:22393): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3686.065112][ T30] audit: type=1400 audit(3685.470:22394): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3686.719696][ T30] audit: type=1400 audit(3686.100:22395): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3687.120111][ T30] audit: type=1400 audit(3686.510:22396): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3687.133101][ T30] audit: type=1400 audit(3686.540:22397): avc: denied { execute } for pid=5355 comm="syz-executor" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3687.321067][ T30] audit: type=1400 audit(3686.690:22398): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3687.600061][ T30] audit: type=1400 audit(3686.980:22399): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3687.606520][ T30] audit: type=1400 audit(3687.010:22400): avc: denied { execute_no_trans } for pid=5355 comm="syz-executor" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3687.826373][ T30] audit: type=1400 audit(3687.230:22401): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3690.294706][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 3690.294886][ T30] audit: type=1400 audit(3689.700:22420): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3690.443614][ T30] audit: type=1400 audit(3689.850:22421): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3690.838906][ T30] audit: type=1400 audit(3690.220:22422): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3690.999732][ T30] audit: type=1400 audit(3690.380:22423): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3691.024183][ T30] audit: type=1400 audit(3690.430:22424): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3691.065001][ T30] audit: type=1400 audit(3690.470:22425): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3691.128859][ T30] audit: type=1400 audit(3690.510:22426): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3693.683769][ T30] audit: type=1400 audit(3691.930:22427): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3693.685146][ T30] audit: type=1400 audit(3692.100:22428): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3693.686296][ T30] audit: type=1400 audit(3692.140:22429): avc: denied { read } for pid=5357 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3695.408672][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 3695.408878][ T30] audit: type=1400 audit(3694.810:22452): avc: denied { prog_load } for pid=5356 comm="syz.0.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3695.478113][ T30] audit: type=1400 audit(3694.860:22453): avc: denied { bpf } for pid=5356 comm="syz.0.406" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3695.520741][ T30] audit: type=1400 audit(3694.930:22454): avc: denied { perfmon } for pid=5356 comm="syz.0.406" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3695.658079][ T30] audit: type=1400 audit(3695.060:22455): avc: denied { prog_load } for pid=5356 comm="syz.0.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3695.814672][ T30] audit: type=1400 audit(3695.220:22456): avc: denied { bpf } for pid=5356 comm="syz.0.406" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3695.888249][ T30] audit: type=1400 audit(3695.280:22457): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3696.050592][ T30] audit: type=1400 audit(3695.460:22458): avc: denied { perfmon } for pid=5356 comm="syz.0.406" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3696.230076][ T30] audit: type=1400 audit(3695.630:22459): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3696.502652][ T30] audit: type=1400 audit(3695.820:22460): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3696.648797][ T30] audit: type=1400 audit(3696.050:22461): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3702.420377][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 3702.420555][ T30] audit: type=1400 audit(3701.820:22471): avc: denied { sys_module } for pid=5357 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3702.581418][ T30] audit: type=1400 audit(3701.990:22472): avc: denied { module_request } for pid=5357 comm="syz-executor" kmod="nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3705.406962][ T30] audit: type=1400 audit(3702.390:22473): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3705.409325][ T30] audit: type=1400 audit(3702.590:22474): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3705.410532][ T30] audit: type=1400 audit(3702.670:22475): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3705.411736][ T30] audit: type=1400 audit(3702.750:22476): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3705.412936][ T30] audit: type=1400 audit(3702.830:22477): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3705.414127][ T30] audit: type=1400 audit(3703.590:22478): avc: denied { read } for pid=3127 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 3708.245980][ T30] audit: type=1400 audit(3705.420:22479): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3708.251131][ T30] audit: type=1400 audit(3705.750:22480): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3708.252751][ T30] audit: type=1400 audit(3705.860:22481): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3708.254338][ T30] audit: type=1400 audit(3705.910:22482): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3708.261890][ T30] audit: type=1400 audit(3705.960:22483): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3708.263064][ T30] audit: type=1400 audit(3706.060:22484): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3708.264148][ T30] audit: type=1400 audit(3706.140:22485): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3708.265176][ T30] audit: type=1400 audit(3706.200:22486): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3708.266263][ T30] audit: type=1400 audit(3706.280:22487): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3708.269277][ T30] audit: type=1400 audit(3706.360:22488): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3712.610963][ T36] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3712.818286][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3713.093917][ T36] bond0 (unregistering): Released all slaves [ 3713.402607][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 3713.402768][ T30] audit: type=1400 audit(3712.810:22513): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3713.460297][ T30] audit: type=1400 audit(3712.860:22514): avc: denied { module_request } for pid=5367 comm="syz.0.409" kmod="crypto-ccm(sm4)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3713.610246][ T30] audit: type=1400 audit(3712.940:22515): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3713.886937][ T30] audit: type=1400 audit(3713.290:22516): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3713.980692][ T30] audit: type=1400 audit(3713.380:22517): avc: denied { module_request } for pid=5357 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3714.379122][ T30] audit: type=1400 audit(3713.730:22518): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3714.402158][ T30] audit: type=1400 audit(3713.810:22519): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3714.493643][ T30] audit: type=1400 audit(3713.900:22520): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3714.566047][ T30] audit: type=1400 audit(3713.970:22521): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3714.971462][ T30] audit: type=1400 audit(3714.320:22522): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3715.243305][ T36] hsr_slave_0: left promiscuous mode [ 3715.303213][ T36] hsr_slave_1: left promiscuous mode [ 3721.729792][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 3721.729977][ T30] audit: type=1400 audit(3721.060:22534): avc: denied { read write } for pid=3277 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3721.778790][ T30] audit: type=1400 audit(3721.180:22535): avc: denied { read write open } for pid=3277 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3721.969996][ T30] audit: type=1400 audit(3721.380:22536): avc: denied { ioctl } for pid=3277 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3722.105808][ T30] audit: type=1400 audit(3721.510:22537): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3722.324563][ T30] audit: type=1400 audit(3721.730:22538): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3722.387952][ T30] audit: type=1400 audit(3721.790:22539): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3722.549691][ T30] audit: type=1400 audit(3721.900:22540): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3722.551286][ T30] audit: type=1400 audit(3721.940:22541): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3722.691196][ T30] audit: type=1400 audit(3722.100:22542): avc: denied { sys_module } for pid=5357 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3722.767893][ T30] audit: type=1400 audit(3722.150:22543): avc: denied { module_request } for pid=5357 comm="syz-executor" kmod="nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3726.984146][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 3726.984325][ T30] audit: type=1326 audit(3726.390:22552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5377 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x126d8c code=0x7ffc0000 [ 3726.986203][ T30] audit: type=1326 audit(3726.390:22553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5377 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x133470 code=0x7ffc0000 [ 3727.016320][ T30] audit: type=1326 audit(3726.390:22554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5377 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x133470 code=0x7ffc0000 [ 3727.018946][ T30] audit: type=1326 audit(3726.420:22555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5377 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x126d8c code=0x7ffc0000 [ 3727.019790][ T30] audit: type=1326 audit(3726.420:22556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5377 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=1 ip=0x133470 code=0x7ffc0000 [ 3727.216635][ T30] audit: type=1400 audit(3726.620:22557): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3727.298634][ T30] audit: type=1400 audit(3726.700:22558): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3727.358701][ T30] audit: type=1400 audit(3726.750:22559): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3727.424439][ T30] audit: type=1400 audit(3726.830:22560): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3727.454328][ T30] audit: type=1400 audit(3726.860:22561): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3731.449066][ T5012] usb 1-1: new high-speed USB device number 32 using dummy_hcd [ 3731.838202][ T5012] usb 1-1: device descriptor read/64, error -71 [ 3732.019791][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 3732.019911][ T30] audit: type=1400 audit(3731.430:22598): avc: denied { ioctl } for pid=5379 comm="syz.0.411" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3732.037865][ T30] audit: type=1400 audit(3731.440:22599): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3732.099071][ T30] audit: type=1400 audit(3731.500:22600): avc: denied { ioctl } for pid=5379 comm="syz.0.411" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3732.109604][ T5012] usb 1-1: new high-speed USB device number 33 using dummy_hcd [ 3732.199981][ T30] audit: type=1400 audit(3731.610:22601): avc: denied { ioctl } for pid=5379 comm="syz.0.411" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3732.297929][ T30] audit: type=1400 audit(3731.700:22602): avc: denied { ioctl } for pid=5379 comm="syz.0.411" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3732.468424][ T5012] usb 1-1: device descriptor read/64, error -71 [ 3732.478015][ T30] audit: type=1400 audit(3731.820:22603): avc: denied { ioctl } for pid=5379 comm="syz.0.411" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3732.531827][ T30] audit: type=1400 audit(3731.940:22604): avc: denied { ioctl } for pid=5379 comm="syz.0.411" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3732.581814][ T5012] usb usb1-port1: attempt power cycle [ 3732.613302][ T30] audit: type=1400 audit(3732.020:22605): avc: denied { ioctl } for pid=5379 comm="syz.0.411" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3732.694069][ T30] audit: type=1400 audit(3732.100:22606): avc: denied { ioctl } for pid=5379 comm="syz.0.411" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3732.768157][ T30] audit: type=1400 audit(3732.170:22607): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3732.988291][ T5012] usb 1-1: new high-speed USB device number 34 using dummy_hcd [ 3734.104402][ T5012] usb 1-1: device descriptor read/8, error -71 [ 3734.388981][ T5012] usb 1-1: new high-speed USB device number 35 using dummy_hcd [ 3735.971004][ T5012] usb 1-1: device descriptor read/8, error -71 [ 3737.049678][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 3737.049841][ T30] audit: type=1400 audit(3736.460:22640): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3737.506399][ T30] audit: type=1400 audit(3736.910:22641): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3737.621608][ T5012] usb usb1-port1: unable to enumerate USB device [ 3737.630728][ T30] audit: type=1400 audit(3737.030:22642): avc: denied { ioctl } for pid=5379 comm="syz.0.411" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3737.818835][ T30] audit: type=1400 audit(3737.160:22643): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3737.888594][ T30] audit: type=1400 audit(3737.270:22644): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3737.975912][ T30] audit: type=1400 audit(3737.380:22645): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3738.221739][ T30] audit: type=1400 audit(3737.630:22646): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3738.363453][ T30] audit: type=1400 audit(3737.770:22647): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3738.460533][ T30] audit: type=1400 audit(3737.870:22648): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3738.525618][ T30] audit: type=1400 audit(3737.930:22649): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3743.088849][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 3743.088952][ T30] audit: type=1400 audit(3742.410:22658): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3743.130551][ T30] audit: type=1400 audit(3742.490:22659): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3743.131531][ T30] audit: type=1400 audit(3742.530:22660): avc: denied { sys_module } for pid=5357 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3743.343216][ T30] audit: type=1400 audit(3742.570:22661): avc: denied { module_request } for pid=5357 comm="syz-executor" kmod="rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3743.344817][ T30] audit: type=1400 audit(3742.610:22662): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3743.379421][ T30] audit: type=1400 audit(3742.790:22663): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3743.460525][ T30] audit: type=1400 audit(3742.860:22664): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3743.528639][ T30] audit: type=1400 audit(3742.910:22665): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3743.563790][ T30] audit: type=1400 audit(3742.970:22666): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3743.681345][ T30] audit: type=1400 audit(3743.030:22667): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3748.273778][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 3748.273875][ T30] audit: type=1400 audit(3747.680:22691): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3748.615653][ T30] audit: type=1400 audit(3748.020:22692): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3748.730607][ T30] audit: type=1400 audit(3748.130:22693): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3748.829139][ T30] audit: type=1400 audit(3748.220:22694): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3748.919411][ T30] audit: type=1400 audit(3748.320:22695): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3749.335832][ T30] audit: type=1400 audit(3748.740:22696): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3749.658706][ T30] audit: type=1400 audit(3749.060:22697): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3749.808767][ T30] audit: type=1400 audit(3749.160:22698): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3750.199058][ T30] audit: type=1400 audit(3749.220:22699): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3750.200180][ T30] audit: type=1400 audit(3749.300:22700): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3753.476783][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 3753.476951][ T30] audit: type=1400 audit(3752.880:22707): avc: denied { read write } for pid=3277 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3753.701549][ T30] audit: type=1400 audit(3753.070:22708): avc: denied { read write open } for pid=3277 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3753.852820][ T30] audit: type=1400 audit(3753.260:22709): avc: denied { ioctl } for pid=3277 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3756.415626][ T30] audit: type=1400 audit(3753.690:22710): avc: denied { search } for pid=5388 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3756.416564][ T30] audit: type=1400 audit(3753.710:22711): avc: denied { search } for pid=5388 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3756.418087][ T30] audit: type=1400 audit(3753.730:22712): avc: denied { search } for pid=5388 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3756.418904][ T30] audit: type=1400 audit(3753.750:22713): avc: denied { search } for pid=5388 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3756.420042][ T30] audit: type=1400 audit(3754.260:22714): avc: denied { search } for pid=5391 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3756.420819][ T30] audit: type=1400 audit(3754.280:22715): avc: denied { search } for pid=5391 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3756.421688][ T30] audit: type=1400 audit(3754.300:22716): avc: denied { search } for pid=5391 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3758.498777][ T30] kauditd_printk_skb: 74 callbacks suppressed [ 3758.498960][ T30] audit: type=1400 audit(3757.570:22791): avc: denied { read } for pid=5391 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3758.501011][ T30] audit: type=1400 audit(3757.600:22792): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3758.502402][ T30] audit: type=1400 audit(3757.610:22793): avc: denied { read open } for pid=5391 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3758.503815][ T30] audit: type=1400 audit(3757.650:22794): avc: denied { getattr } for pid=5391 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3758.505249][ T30] audit: type=1400 audit(3757.700:22795): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3758.506620][ T30] audit: type=1400 audit(3757.790:22796): avc: denied { search } for pid=5391 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3758.528593][ T30] audit: type=1400 audit(3757.810:22797): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3758.538523][ T30] audit: type=1400 audit(3757.830:22798): avc: denied { search } for pid=5391 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3758.540081][ T30] audit: type=1400 audit(3757.870:22799): avc: denied { search } for pid=5391 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3758.541430][ T30] audit: type=1400 audit(3757.890:22800): avc: denied { search } for pid=5391 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3763.533829][ T30] kauditd_printk_skb: 94 callbacks suppressed [ 3763.533917][ T30] audit: type=1400 audit(3762.940:22895): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3763.598051][ T30] audit: type=1400 audit(3763.000:22896): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3763.835914][ T30] audit: type=1400 audit(3763.240:22897): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3764.058257][ T30] audit: type=1400 audit(3763.410:22898): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3764.098364][ T30] audit: type=1400 audit(3763.500:22899): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3764.196919][ T30] audit: type=1400 audit(3763.600:22900): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3764.309291][ T30] audit: type=1400 audit(3763.700:22901): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3764.841849][ T30] audit: type=1400 audit(3764.250:22902): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3765.138589][ T30] audit: type=1400 audit(3764.540:22903): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3765.365231][ T30] audit: type=1400 audit(3764.770:22904): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3771.088263][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 3771.088369][ T30] audit: type=1400 audit(3766.120:22909): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3771.089518][ T30] audit: type=1400 audit(3766.270:22910): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3771.090428][ T30] audit: type=1400 audit(3766.390:22911): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3771.091430][ T30] audit: type=1400 audit(3766.510:22912): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3771.092109][ T30] audit: type=1400 audit(3766.780:22913): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3771.092920][ T30] audit: type=1400 audit(3766.960:22914): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3771.093759][ T30] audit: type=1400 audit(3767.050:22915): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3771.094669][ T30] audit: type=1400 audit(3767.100:22916): avc: denied { module_request } for pid=5357 comm="syz-executor" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3771.095461][ T30] audit: type=1400 audit(3767.120:22917): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3771.096243][ T30] audit: type=1400 audit(3767.160:22918): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3777.359016][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 3777.359210][ T30] audit: type=1400 audit(3776.240:22954): avc: denied { search } for pid=5402 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3777.361235][ T30] audit: type=1400 audit(3776.280:22955): avc: denied { search } for pid=5402 comm="rm" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3777.362557][ T30] audit: type=1400 audit(3776.310:22956): avc: denied { search } for pid=5402 comm="rm" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3777.363852][ T30] audit: type=1400 audit(3776.350:22957): avc: denied { getattr } for pid=5402 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=1987 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3777.365246][ T30] audit: type=1400 audit(3776.480:22958): avc: denied { search } for pid=5402 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3777.366534][ T30] audit: type=1400 audit(3776.520:22959): avc: denied { search } for pid=5402 comm="rm" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3777.388995][ T30] audit: type=1400 audit(3776.560:22960): avc: denied { search } for pid=5402 comm="rm" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3777.390493][ T30] audit: type=1400 audit(3776.600:22961): avc: denied { write search } for pid=5402 comm="rm" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3777.391794][ T30] audit: type=1400 audit(3776.640:22962): avc: denied { remove_name search } for pid=5402 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1987 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3777.393199][ T30] audit: type=1400 audit(3776.680:22963): avc: denied { unlink } for pid=5402 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1987 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3783.288614][ T30] audit: type=1400 audit(3779.370:22964): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3783.290295][ T30] audit: type=1400 audit(3779.650:22965): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3783.291652][ T30] audit: type=1400 audit(3779.780:22966): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3783.293007][ T30] audit: type=1400 audit(3779.880:22967): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3783.294457][ T30] audit: type=1400 audit(3779.960:22968): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3783.295852][ T30] audit: type=1400 audit(3780.160:22969): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3783.308744][ T30] audit: type=1400 audit(3780.320:22970): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3783.310327][ T30] audit: type=1400 audit(3780.400:22971): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3783.311685][ T30] audit: type=1400 audit(3780.500:22972): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3783.313078][ T30] audit: type=1400 audit(3780.570:22973): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3785.604867][ C1] Adjusting arch_sys_counter more than 11% (108770047 vs 148981678) [ 3789.274201][ T30] kauditd_printk_skb: 45 callbacks suppressed [ 3789.274312][ T30] audit: type=1400 audit(3787.763:23019): avc: denied { read write } for pid=5409 comm="syz.0.416" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 3789.275615][ T30] audit: type=1400 audit(3787.797:23020): avc: denied { read write open } for pid=5409 comm="syz.0.416" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 3789.276590][ T30] audit: type=1400 audit(3787.832:23021): avc: denied { mounton } for pid=5409 comm="syz.0.416" path="/373/file0" dev="tmpfs" ino=1913 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3789.277373][ T30] audit: type=1400 audit(3787.893:23022): avc: denied { mount } for pid=5409 comm="syz.0.416" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3789.569092][ T30] audit: type=1400 audit(3788.137:23023): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3789.570230][ T30] audit: type=1400 audit(3788.173:23024): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3789.570998][ T30] audit: type=1400 audit(3788.182:23025): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3789.571763][ T30] audit: type=1400 audit(3788.208:23026): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3789.572538][ T30] audit: type=1400 audit(3788.226:23027): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3789.573293][ T30] audit: type=1400 audit(3788.332:23028): avc: denied { module_request } for pid=5357 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3795.708017][ T30] audit: type=1400 audit(3793.257:23029): avc: denied { search } for pid=3127 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3795.708970][ T30] audit: type=1400 audit(3793.266:23030): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3795.709801][ T30] audit: type=1400 audit(3793.275:23031): avc: denied { search } for pid=3127 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3795.710579][ T30] audit: type=1400 audit(3793.294:23032): avc: denied { search } for pid=3127 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3795.711159][ T30] audit: type=1400 audit(3793.312:23033): avc: denied { read } for pid=3127 comm="dhcpcd" name="n43" dev="tmpfs" ino=1981 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3795.711733][ T30] audit: type=1400 audit(3793.331:23034): avc: denied { read open } for pid=3127 comm="dhcpcd" path="/run/udev/data/n43" dev="tmpfs" ino=1981 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3795.712324][ T30] audit: type=1400 audit(3793.331:23035): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3795.712913][ T30] audit: type=1400 audit(3793.349:23036): avc: denied { getattr } for pid=3127 comm="dhcpcd" path="/run/udev/data/n43" dev="tmpfs" ino=1981 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3795.713637][ T30] audit: type=1400 audit(3793.377:23037): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3795.714415][ T30] audit: type=1400 audit(3793.414:23038): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3801.792799][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 3801.792907][ T30] audit: type=1400 audit(3798.335:23050): avc: denied { ioctl } for pid=3277 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3802.479841][ T30] audit: type=1400 audit(3800.191:23051): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3802.587879][ T30] audit: type=1400 audit(3800.313:23052): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3802.658372][ T30] audit: type=1400 audit(3800.378:23053): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3802.823160][ T30] audit: type=1400 audit(3800.537:23054): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3802.899635][ T30] audit: type=1400 audit(3800.602:23055): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3803.973883][ T30] audit: type=1400 audit(3801.601:23056): avc: denied { map_create } for pid=5421 comm="syz.0.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3804.192028][ T30] audit: type=1400 audit(3801.807:23057): avc: denied { bpf } for pid=5421 comm="syz.0.417" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3804.289632][ T30] audit: type=1400 audit(3801.844:23058): avc: denied { module_request } for pid=5357 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3805.968310][ T30] audit: type=1400 audit(3802.517:23059): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3807.323115][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 3807.323270][ T30] audit: type=1400 audit(3804.732:23069): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3807.504597][ T30] audit: type=1400 audit(3804.901:23070): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3807.594148][ T30] audit: type=1400 audit(3804.975:23071): avc: denied { search } for pid=5425 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3807.628619][ T30] audit: type=1400 audit(3805.003:23072): avc: denied { search } for pid=5425 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3807.680903][ T30] audit: type=1400 audit(3805.041:23073): avc: denied { search } for pid=5425 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3807.687157][ T30] audit: type=1400 audit(3805.078:23075): avc: denied { search } for pid=5425 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3807.840182][ T30] audit: type=1400 audit(3805.041:23074): avc: denied { prog_load } for pid=5421 comm="syz.0.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3807.902468][ T30] audit: type=1400 audit(3805.275:23076): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3808.167681][ T30] audit: type=1400 audit(3805.527:23077): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3808.247821][ T30] audit: type=1400 audit(3805.592:23079): avc: denied { bpf } for pid=5421 comm="syz.0.417" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3813.348534][ T30] kauditd_printk_skb: 61 callbacks suppressed [ 3813.348711][ T30] audit: type=1400 audit(3808.155:23140): avc: denied { search } for pid=5429 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3813.350572][ T30] audit: type=1400 audit(3808.164:23141): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3813.351858][ T30] audit: type=1400 audit(3808.192:23142): avc: denied { search } for pid=5429 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3813.353011][ T30] audit: type=1400 audit(3808.314:23143): avc: denied { search } for pid=5429 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3813.354182][ T30] audit: type=1400 audit(3808.332:23144): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3813.355354][ T30] audit: type=1400 audit(3808.351:23145): avc: denied { search } for pid=5429 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3813.359993][ T30] audit: type=1400 audit(3808.388:23146): avc: denied { search } for pid=5429 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3813.361326][ T30] audit: type=1400 audit(3808.417:23147): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3813.362636][ T30] audit: type=1400 audit(3808.426:23148): avc: denied { read } for pid=5429 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3813.364008][ T30] audit: type=1400 audit(3808.463:23149): avc: denied { read open } for pid=5429 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=632 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3818.785884][ T30] kauditd_printk_skb: 96 callbacks suppressed [ 3818.786059][ T30] audit: type=1400 audit(3815.460:23246): avc: denied { add_name search } for pid=5425 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3818.867021][ T30] audit: type=1400 audit(3815.534:23247): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3818.929297][ T30] audit: type=1400 audit(3815.581:23248): avc: denied { create } for pid=5425 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3819.185765][ T30] audit: type=1400 audit(3815.824:23249): avc: denied { write open } for pid=5425 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2011 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3819.216950][ T30] audit: type=1400 audit(3815.852:23250): avc: denied { create } for pid=5432 comm="syz.0.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3819.284158][ T30] audit: type=1400 audit(3815.918:23251): avc: denied { create } for pid=5432 comm="syz.0.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3819.495010][ T30] audit: type=1400 audit(3816.114:23252): avc: denied { setopt } for pid=5432 comm="syz.0.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3819.730699][ T30] audit: type=1400 audit(3816.339:23253): avc: denied { setopt } for pid=5432 comm="syz.0.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3819.800879][ T30] audit: type=1400 audit(3816.395:23254): avc: denied { setopt } for pid=5432 comm="syz.0.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3819.869336][ T30] audit: type=1400 audit(3816.451:23255): avc: denied { bind } for pid=5432 comm="syz.0.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3824.273004][ T30] kauditd_printk_skb: 47 callbacks suppressed [ 3824.273117][ T30] audit: type=1400 audit(3820.585:23303): avc: denied { search } for pid=5425 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3824.412508][ T30] audit: type=1400 audit(3820.679:23304): avc: denied { getattr } for pid=5425 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3824.599736][ T30] audit: type=1400 audit(3820.894:23305): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3824.636382][ T30] audit: type=1400 audit(3820.903:23306): avc: denied { search } for pid=5425 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3824.703936][ T30] audit: type=1400 audit(3820.997:23307): avc: denied { search } for pid=5425 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3824.863507][ T30] audit: type=1400 audit(3821.147:23308): avc: denied { search } for pid=5425 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3824.915987][ T30] audit: type=1400 audit(3821.165:23309): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3825.022675][ T30] audit: type=1400 audit(3821.278:23310): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3825.047446][ T30] audit: type=1400 audit(3821.315:23311): avc: denied { getattr } for pid=5425 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2011 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3825.197931][ T30] audit: type=1400 audit(3821.427:23312): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3829.918023][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 3829.918216][ T30] audit: type=1400 audit(3825.861:23330): avc: denied { prog_load } for pid=5436 comm="syz.0.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3830.198847][ T30] audit: type=1400 audit(3826.123:23331): avc: denied { bpf } for pid=5436 comm="syz.0.420" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3830.388980][ T30] audit: type=1400 audit(3826.263:23332): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3830.562014][ T30] audit: type=1400 audit(3826.478:23333): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3830.629403][ T30] audit: type=1400 audit(3826.535:23334): avc: denied { perfmon } for pid=5436 comm="syz.0.420" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3830.651956][ T30] audit: type=1400 audit(3826.553:23335): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3830.675530][ T30] audit: type=1400 audit(3826.572:23336): avc: denied { perfmon } for pid=5436 comm="syz.0.420" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3830.805699][ T30] audit: type=1400 audit(3826.637:23337): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3830.807022][ T30] audit: type=1400 audit(3826.656:23338): avc: denied { perfmon } for pid=5436 comm="syz.0.420" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3830.837410][ T30] audit: type=1400 audit(3826.722:23339): avc: denied { perfmon } for pid=5436 comm="syz.0.420" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3832.303772][ C0] ------------[ cut here ]------------ [ 3832.305810][ C0] WARNING: CPU: 0 PID: 5438 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x508/0x68c [ 3832.308018][ C0] Modules linked in: [ 3832.311907][ C0] CPU: 0 UID: 0 PID: 5438 Comm: modprobe Not tainted 6.12.0-rc4-syzkaller-00261-g850925a8133c #0 [ 3832.313639][ C0] Hardware name: linux,dummy-virt (DT) [ 3832.314618][ C0] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 3832.315405][ C0] pc : inet_sock_destruct+0x508/0x68c [ 3832.316027][ C0] lr : inet_sock_destruct+0x320/0x68c [ 3832.316604][ C0] sp : ffff800080007c50 [ 3832.317166][ C0] x29: ffff800080007c50 x28: 0000000000000001 x27: ffff00001c8b6c90 [ 3832.318553][ C0] x26: ffff000016c43c00 x25: ffff00001c8b70e8 x24: ffff000069fa6f00 [ 3832.319557][ C0] x23: 1fffe00003916d92 x22: ffff00001c8b6c28 x21: 1fffe00003916d85 [ 3832.320531][ C0] x20: ffff80008831f2c0 x19: ffff00001c8b6c00 x18: 00000000ffffffff [ 3832.321494][ C0] x17: ffff7fffe33de000 x16: 0000000000000000 x15: ffff000016c44680 [ 3832.322822][ C0] x14: 1fffe00002d888cf x13: 1fffe00002d888d4 x12: ffff600003916dd4 [ 3832.323874][ C0] x11: 1fffe00003916dd3 x10: ffff600003916dd3 x9 : dfff800000000000 [ 3832.324938][ C0] x8 : ffff00001c8b6e9f x7 : 0000000000000001 x6 : ffff600003916dd3 [ 3832.325895][ C0] x5 : ffff00001c8b6e9c x4 : ffff600003916dd4 x3 : 1fffe00003916dd0 [ 3832.326854][ C0] x2 : 0000000000000000 x1 : 0000000000000007 x0 : 000000000000046b [ 3832.327963][ C0] Call trace: [ 3832.328446][ C0] inet_sock_destruct+0x508/0x68c [ 3832.329115][ C0] inet6_sock_destruct+0x20/0x30 [ 3832.329717][ C0] __sk_destruct+0x4c/0x548 [ 3832.330263][ C0] rcu_core+0x910/0x1ab4 [ 3832.330806][ C0] rcu_core_si+0x10/0x1c [ 3832.331312][ C0] handle_softirqs+0x2e8/0xd40 [ 3832.331849][ C0] __do_softirq+0x14/0x20 [ 3832.332474][ C0] ____do_softirq+0x10/0x1c [ 3832.333274][ C0] call_on_irq_stack+0x24/0x4c [ 3832.333907][ C0] do_softirq_own_stack+0x1c/0x2c [ 3832.334467][ C0] __irq_exit_rcu+0x334/0x434 [ 3832.335010][ C0] irq_exit_rcu+0x14/0x80 [ 3832.335518][ C0] el0_interrupt+0x68/0x1e0 [ 3832.336077][ C0] __el0_irq_handler_common+0x18/0x24 [ 3832.336645][ C0] el0t_64_irq_handler+0x10/0x1c [ 3832.337173][ C0] el0t_64_irq+0x190/0x194 [ 3832.338069][ C0] irq event stamp: 88851 [ 3832.338661][ C0] hardirqs last enabled at (88850): [] _raw_spin_unlock_irqrestore+0x80/0xac [ 3832.339490][ C0] hardirqs last disabled at (88851): [] el1_dbg+0x24/0x9c [ 3832.340216][ C0] softirqs last enabled at (88814): [] fpsimd_restore_current_state+0x44/0xe4 [ 3832.341055][ C0] softirqs last disabled at (88827): [] __do_softirq+0x14/0x20 [ 3832.341991][ C0] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 3835.666327][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 3835.666433][ T30] audit: type=1400 audit(3829.257:23368): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3835.667431][ T30] audit: type=1400 audit(3829.462:23369): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3835.669374][ T30] audit: type=1400 audit(3829.808:23370): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3835.670136][ T30] audit: type=1400 audit(3830.033:23371): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3835.670776][ T30] audit: type=1400 audit(3830.127:23372): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3835.671404][ T30] audit: type=1400 audit(3830.229:23373): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3835.672014][ T30] audit: type=1400 audit(3830.304:23374): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3835.672603][ T30] audit: type=1400 audit(3830.491:23375): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3835.673245][ T30] audit: type=1400 audit(3830.594:23376): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3835.673998][ T30] audit: type=1400 audit(3830.632:23377): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3841.115370][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 3841.115502][ T30] audit: type=1400 audit(3836.347:23407): avc: denied { search } for pid=5443 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3841.250410][ T30] audit: type=1400 audit(3836.366:23408): avc: denied { search } for pid=5443 comm="rm" name="dhcpcd" dev="tmpfs" ino=494 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3841.251509][ T30] audit: type=1400 audit(3836.375:23409): avc: denied { search } for pid=5443 comm="rm" name="hook-state" dev="tmpfs" ino=631 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3841.252391][ T30] audit: type=1400 audit(3836.422:23410): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3841.371518][ T30] audit: type=1400 audit(3836.581:23411): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3841.493161][ T30] audit: type=1400 audit(3836.693:23412): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3842.465588][ T30] audit: type=1400 audit(3836.768:23413): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3842.468419][ T30] audit: type=1400 audit(3836.833:23414): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3843.567206][ T30] audit: type=1400 audit(3838.143:23415): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3843.570558][ T30] audit: type=1400 audit(3838.302:23416): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3845.105724][ T5135] bond0 (unregistering): Released all slaves [ 3846.531215][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 3846.531399][ T30] audit: type=1400 audit(3841.407:23435): avc: denied { write search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3846.677406][ T30] audit: type=1400 audit(3841.538:23436): avc: denied { remove_name search } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3846.726752][ T30] audit: type=1400 audit(3841.595:23437): avc: denied { sys_chroot } for pid=5444 comm="dhcpcd" capability=18 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 3846.778590][ T30] audit: type=1400 audit(3841.623:23438): avc: denied { rename } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3846.795923][ T30] audit: type=1400 audit(3841.651:23439): avc: denied { setgid } for pid=5444 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 3846.840676][ T30] audit: type=1400 audit(3841.697:23440): avc: denied { add_name remove_name search } for pid=3082 comm="syslogd" name="messages.0" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3846.881178][ T30] audit: type=1400 audit(3841.735:23441): avc: denied { unlink } for pid=3082 comm="syslogd" name="messages.0" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3846.885552][ T30] audit: type=1400 audit(3841.744:23442): avc: denied { setgid } for pid=5444 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 3846.959156][ T30] audit: type=1400 audit(3841.810:23443): avc: denied { setuid } for pid=5444 comm="dhcpcd" capability=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 3847.002393][ T30] audit: type=1400 audit(3841.847:23444): avc: denied { setrlimit } for pid=5444 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=process permissive=1 [ 3855.165686][ T5135] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3855.387661][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 3855.387831][ T30] audit: type=1400 audit(3849.695:23467): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3855.684139][ T30] audit: type=1400 audit(3849.835:23468): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3855.685729][ T30] audit: type=1400 audit(3849.873:23469): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3855.686903][ T30] audit: type=1400 audit(3849.920:23470): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3855.688125][ T30] audit: type=1400 audit(3849.957:23471): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3855.696395][ T5135] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3856.195182][ T30] audit: type=1400 audit(3850.434:23472): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3856.270578][ T30] audit: type=1400 audit(3850.509:23473): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3856.298349][ T30] audit: type=1400 audit(3850.546:23474): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3856.350956][ T30] audit: type=1400 audit(3850.593:23475): avc: denied { append open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3856.423058][ T30] audit: type=1400 audit(3850.630:23476): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3856.506822][ T5135] bond0 (unregistering): Released all slaves [ 3857.952888][ T5135] hsr_slave_0: left promiscuous mode [ 3858.432895][ T5135] hsr_slave_1: left promiscuous mode [ 3861.938049][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 3861.938146][ T30] audit: type=1400 audit(3855.813:23485): avc: denied { read } for pid=3127 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 3862.192633][ T30] audit: type=1400 audit(3856.056:23486): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 VM DIAGNOSIS: 10:32:24 Registers: info registers vcpu 0 CPU#0 PC=ffff800080329084 X00=00000000000003c0 X01=00000000fffffe03 X02=0000000000000000 X03=ffff80008032902c X04=ffff700010000e5b X05=ffff8000800072d0 X06=ffff700010000e5a X07=0000000000000001 X08=ffff8000800072d7 X09=dfff800000000000 X10=ffff700010000e5a X11=1ffff00010000e5a X12=ffff700010000e5b X13=1ffff00010aa301c X14=0000000000000000 X15=ffff000016c44680 X16=0000000000000000 X17=0000000000000000 X18=00000000641e7e38 X19=1ffff00010000e8b X20=ffff800080007450 X21=ffff800080007458 X22=ffff800086d171e0 X23=1ffff00010000e56 X24=ffff8000800072d0 X25=00000000fffffe03 X26=000000000000000d X27=00000000fffffe03 X28=0000000000000060 X29=ffff800080007250 X30=ffff80008032902c SP=ffff800080007250 PSTATE=600003c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=f00ff00ff00ff00f:f00ff00ff00ff00f Q02=f00ff00ff00ff00f:f00ff00ff00ff00f Q03=ffffffffffffffff:ffffffffffffffff Q04=3003300330033003:3003300330033003 Q05=f00ff00ff00ff00f:f00ff00ff00ff00f Q06=0000000000c00000:0000000000c00000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000803710e4 X00=ffff800086e064e0 X01=ffff80008525ad80 X02=1ffff00011ceee94 X03=1fffe0000d3f6889 X04=00000000f204f1f1 X05=ffff80008cb76768 X06=ffff70001196eced X07=0000000000000001 X08=ffff80008cb76768 X09=dfff800000000000 X10=ffff70001196eced X11=1ffff0001196eced X12=ffff70001196ecee X13=1fffe000029588de X14=1fffe000029588cf X15=ffff000014ac4680 X16=0000000000000000 X17=0000000000000000 X18=0000000085c98af6 X19=dfff800000000000 X20=ffff80008e777470 X21=0000000000000000 X22=ffff000014ac3c00 X23=ffff00001889bf70 X24=0000000000000000 X25=0000000000000161 X26=ffff800086c0fbc4 X27=ffff000014ac3c00 X28=1fffe000029588cf X29=ffff80008e7773a0 X30=ffff8000851b0054 SP=ffff80008e7773d0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=3a45000a756c253a:49000a69253a5700 Q02=c000000c00000000:0000000000000000 Q03=0000f0000000f000:000f0000f000000f Q04=f00ff00ff00ff00f:f00ff00ff00ff00f Q05=00f000f00f00f00f:00f000f00f00f00f Q06=c00c000000000000:c00c000000000000 Q07=0000aaab0413a790:000002da00000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000002000:0000000000000000 Q17=000000000000000b:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000