last executing test programs: 1m0.636995666s ago: executing program 0 (id=2725): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r0) (async, rerun: 64) r1 = openat$cuse(0xffffff9c, &(0x7f0000000200), 0x2, 0x0) (rerun: 64) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async, rerun: 32) listen(r2, 0x0) (async, rerun: 32) r3 = socket$unix(0x1, 0x1, 0x0) connect$unix(r3, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept4$unix(r0, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') read$usbfs(r5, &(0x7f0000000000)=""/13, 0xd) (async) preadv(r5, &(0x7f0000000180)=[{&(0x7f00000004c0)=""/194, 0xc2}], 0x1, 0x2, 0x0) (async) write$binfmt_elf64(r4, 0x0, 0x0) 50.547001041s ago: executing program 0 (id=2728): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)='\x00', 0x1, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private1}, 0x1c) shutdown(r0, 0x1) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r2, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7f, 0x1}}}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x20000810) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x0, 0x81}, &(0x7f0000000100)=0x8) 50.333145978s ago: executing program 1 (id=2729): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$FS_IOC_GETFLAGS(r0, 0x5421, &(0x7f0000000640)) (fail_nth: 5) 47.233574365s ago: executing program 1 (id=2730): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40800}, 0x40) 44.274066599s ago: executing program 1 (id=2731): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc0105303, &(0x7f0000000300)={0x3, 0x0, 0x0, 'queue1\x00'}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0}) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000003c0)={"6073931af71a0414b16e61317213a469", 0x0, r1, {0x5, 0x4}, {0x7be334f3, 0x81}, 0x2732, [0x6000000000, 0xfffffffffffffffa, 0x40, 0x4002, 0x7ff, 0x53a2, 0x5, 0x400, 0x8, 0x5, 0x2, 0x0, 0x1, 0x9, 0x8, 0x81]}) 39.209218962s ago: executing program 1 (id=2732): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001800)='/sys/class/power_supply', 0x0, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f00000006c0)='.pending_reads\x00', 0xe8440, 0x11) ioctl$TIOCPKT(r1, 0x5452, &(0x7f0000000080)) close(r0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r4, 0x80044d1d, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = accept4$unix(r0, 0x0, 0x0, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) ioctl$F2FS_IOC_GET_COMPRESS_OPTION(r8, 0x8002f515, &(0x7f0000000680)) connect$unix(r6, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$setown(r7, 0x8, 0x0) fstatfs(r7, &(0x7f0000000100)=""/167) sendmsg$sock(r6, &(0x7f0000000640)={&(0x7f0000000200)=@ax25={{0x3, @null, 0x1}, [@null, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000300)="d43f58f6f2d79c71d22fa1f726f9f4fe2aae0c38bf290008619a9ec5e59d108a95fd026f768be33e589ed52a64858254143c9a17f91ffd1ab59c2c588dada5ccc7c8b8d0c34ab8057137eb862387cf1c3958fc25cfe19a3416466e7a4b78b5dc70142302233e317edd29bbe23b315c19ce59cee9db3eb550cda460afdf30c7165346c93956a1e45d149b947c84b8df55d4ae8527484665aeda723265bd586707907fddaf0d0fccb536ef4c68ba384f63fe9e2fc0b18b2b80f41f944ebf29b9d141007738e7022da4e70afd0ae9920a8376840405d4507a5b82fd48b5f3249cd7979c80df378dbc2b4843cd11058c70ede633", 0xffffffffffffffec}, {&(0x7f0000000400)="69c34bc593a90777c061485b4fdcdf51f7d25d191785079aae70021717acb8ae91812421a86d84041018fb7d8395cb34460c86c906f7f5179b1374bee8504297cb2c9c843dda9a866d1170cf79e70183d1c8a089fd02cf4962861e23592ecb51a2276caedf0a65414588262468e65be48152569edbc06b39d0a2061e36cedf85ee9ec5f663f2478ec03f3261c5c468425eae647668be2d5814a0265e35ac4e96ef9d", 0xa2}, {&(0x7f00000004c0)="e82f8bec6b77e8504245ddf44a682a98f38a4a136cd743011a0024ad5b622f1af4ae30811967cde8f1cb91655c230b8a9e1a851485e1b4e5fd2cfc4a6a0338703d0cfd18229e00837e76370c0a40ef3502bba88e6f2b38d41b079fe43ad6ef88904809e0335f8a21db5e2db198c98ede95b009d9402f94eb1c2151840b607614ddf564abd760b6d8c42a8c110f119f8537c8da4d759922c04968d779762484434b1fece8f4172fb71b59a75012e9ad274ae294b48ebd2a2f40", 0xb9}], 0x3, &(0x7f0000000580)=[@txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x845}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff7}}, @mark={{0x14, 0x1, 0x24, 0x40000004}}, @mark={{0x14, 0x1, 0x24, 0x2}}], 0x90}, 0x44810) recvfrom$inet6(r0, &(0x7f0000000000)=""/137, 0xd6, 0x40000100, &(0x7f00000001c0)={0xa, 0x4e23, 0x10008, @local, 0xdbd}, 0x1c) 29.751705799s ago: executing program 0 (id=2733): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xf, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000002c0)={r0, r1, 0x6}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 29.748689219s ago: executing program 1 (id=2734): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x24, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040000}, 0x8000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r0) r2 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000180)) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) sendmsg$nl_xfrm(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@flushsa={0x20, 0x1c, 0x1, 0x70bd2b, 0x25dfdbfb, {0x33}, [@mark={0xc, 0x15, {0x35075d, 0x3}}]}, 0x20}, 0x1, 0x0, 0x0, 0x40040d4}, 0x40000) read$FUSE(r3, &(0x7f0000000300)={0x2020}, 0x2020) ioctl$KDENABIO(r3, 0x4b36) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000037c0)={0x0, 0x6}, &(0x7f0000003800)=0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000006200)={0x0, 0x2, 0x7, [0x7, 0x9, 0x7, 0x3, 0x40, 0xf44, 0x4b5]}, &(0x7f0000006240)=0x16) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000006280)={0x0, 0x1b, "019d7bc1425671af5acd54f46be63c3a0e446ee4b8c60928bf00b7"}, &(0x7f00000062c0)=0x23) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000006a00)={0x0, 0x8, "5d63d652e069796d"}, &(0x7f0000006a40)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000008880)=[{&(0x7f0000002340)=@in6={0xa, 0x4e24, 0xfffffff8, @private0, 0xfffffff9}, 0x1c, &(0x7f0000003740)=[{&(0x7f0000002380)="1dce4686472135e5c1e8b999ceb017a5ee85606a3795b627a7231ef611eea61e90043c4ee178", 0x26}, {&(0x7f00000023c0)="1720fa01b079e2d13eb03da69cd47310f055939aff9c2a27f4495e49dc64cd1198a2f2165b97dc9d4ea0b037026856195b6144cb96bdfbd33fa0a4bfec4351f3ab7761385b0622dfcd52cc7e469f0c02a827244c54c5ca3edf31c7e676982216f73b7db2e098cb1324bfd15e9a9b82a9fa554fd2fc279dccea47d80a23", 0x7d}, {&(0x7f0000002440)="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", 0x1000}, {&(0x7f0000003440)="efa70911190590bfded2e023b0c47117fe450c8cfc0cea9c0784cdc220448b0c6e07414a5b1dffbcfee3860fb1f5e61ee3d7b107eb9ff4fde8055f3bccb459ff460714d8010e53aabbb29c490e918275ca466b840e435a4e5441cf782838214b6fbaa4", 0x63}, {&(0x7f00000034c0)="284c5321b2da7f252f58ef26ec0a37e8392313651e76ba4ce067abca9c7bc880973b9f5dd3de72b2c346aac6c80ad49815647959f6205a37fbe851895d9fe88a4266732574c193", 0x47}, {&(0x7f0000003540)="9b23be5dd660ffdc39212e1cdbd26d5d8ddbbe1231e147c61d2d2366e26d553eb7b1010e66fb285da9ae2da1f7afebf607e5d57bc0563e9482cc7215881865642ca8c8effebddbf63c467b00d0c6662166e1bdaa09674ae91bd76156b21b21ba19a5ee75804ac96c61371bf6757dea45feef25a57a04869b6cc40e2701ae6737068fc10988f3bda8282270fd1dfb7285f444dd62aa35a1ea7459ed48e311581542ce7184002e2d4d312e2f9f00f5b7bbad6bebde5fdfb4b019a0227305fa42c5a33ebdd1abd5e0332610d7f1d7ad1c2c7c3619bf742a3f87492ca36c0b", 0xdd}, {&(0x7f0000003640)="4d09d7c389ce01863468707de974b2acc4c96c032939b3fa938fc282d504938334f65b0cdfc7189807f8234172e117017bbf19b3928fc405694afc02d1806f273fe9d2588b6511aac4b5a7963aadfd0d2f171d9526b743b6d1c71c8df13fbac72e62df0619c54eaeee24a63535245d9142f45f1a760559762ed1b266aea712b58984dd8b5fcfdecd0cc47a7b9a8eab", 0x8f}, {&(0x7f0000003700)="5ec49abfaa9433ff5626585a503283cdac1d11be34be1d7454399b4ad33f21012beed65000ca26da50cb5c70781a2af167c04ea1db5ef1fd08", 0x39}], 0x8, &(0x7f0000003840)=[@sndrcv={0x30, 0x84, 0x1, {0x8, 0xf, 0x0, 0x0, 0x800, 0x1, 0x0, 0x4b, r4}}], 0x30, 0x20044045}, {&(0x7f0000003880)=@in={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000003b80)=[{&(0x7f00000038c0)}, {&(0x7f0000003900)="66a13a072768ca519bccb2d86b87c0b64eb2e71af1db659bd922a0b00897931948fdf4a7d3f722f22d3c1bbc0fc7e777c4ec280b508c01c7905b2cc1d363e53add6001f9b50152357b75e192985ded8d391c04a09147960f6ca696fcfa302b5ce9efcd62cc5247c5bfc31d544260a04ed54450571858486d735053b78b9089dd5101afffe8eaf029abb2473d10a1da2091c392dffce89b7028998af6355354ba2b34ef", 0xa3}, {&(0x7f00000039c0)="c160d453fd50433b08c75e4eb70ba6275f72ec72e4e880420e64f11fc80d408fee110bac53ba0088a93c835843c045e18fe93900539b8279f14b80797a264b08e7e207ff2ba9eb6970b274c72797e8de0fad5afb34a1a85ed60de5fdbbf342faaad7dd343b397b91abaa5083ceb63d41273e7bdb53fb040ef3cb9b85423523c89fef69daa8d51978157c8efba9b87140fa4c2be037af4bd249bc7b586f5c02ac99e08ea8f334baf6a4571b", 0xab}, {&(0x7f0000003a80)="b8ceb5e4c5407b4adc945fbf0da844448963a022747e515bb1a1c7650ae6fdfc7aeae86e7d037aee1b5fee918e900b7fb9f75e6133c2fe42db31c6bf01af92f2f34705672e0429760ec20789c7a4791c63da73fa40066697bbb0cfee49d64f40c74c705c207fe7304f99616121ae803bd8534471312131025cd57caa", 0x7c}, {&(0x7f0000003b00)="ea0f6b7dc5620c767994515306adfc736db1aca1de8a155e45998a890481f5c237722b937173f50b4bbb3e49d424817e2952e0c6faf6d6b769880ba28e9eecaf89d7cb139a816f1253e59b1a92681d83d2e47c4586a7a303dfa46c7d143180", 0x5f}], 0x5, &(0x7f0000003c00)=[@dstaddrv6={0x20, 0x84, 0x8, @empty}], 0x20, 0x4044080}, {&(0x7f0000003c40)=@in6={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x3}, 0x1c, &(0x7f0000006140)=[{&(0x7f0000003c80)="b07718e6d29d4bae71f5c3351feefe7944152f59f245bb1063ff8dd0f49cdc15ab99bf8ab502d6b37eb69b5c0cbbbfefbc5f84d2a5c16ca31f03a847f3457d80dc1097c1d3fb5040a5cc440a64fae9e0a1", 0x51}, {&(0x7f0000003d00)="c8e60cb8dd16391c930f12301f3dd32a91efe736a57205999321c0b8c184d8bc92e6b2cdab5ec447d400952977a949871a6f72e5c940db70554c1dc978150c9498ed45b5387083afe3338c68c570454f86c405a723dc8c2450b252b36ddbbe38ac", 0x61}, {&(0x7f0000003d80)="ad66faf018c6dc1f47d42a13db8fd89eeaabddc8b374657f87fb3e855995b8fe8eaba64de27fe7a871f78b834b177d6aeb1010607af86c153c065491d2e961a2026ebe9da7df06922123db903e9a38ea8ec80c3aca0cc19a2c03731cf5c668e733b32ae6febfdd6853edea48d108c24a0b0cb8ff10efe908f6e2490b5cfebf510bed129e08a59c4e98b0933ec94a188799817f", 0x93}, {&(0x7f0000003e40)="2a42c0585a735633bb5de9ea11ce6e041c5e5ff232b5038f4b179fda13b3067b7d9033992bee89808175c7b1f2bf91f282f47ac0c7b3ee58a6b47d3d50b88fd967c42ea120584a22f93a89425d3f4ac9475dd0dfacc74468dc8f8c88b14afc538fade7ada095e8e7252755a3176577942383d49fdd1b0d29411e580c510a5c958b3f2bbd4ebf652f96869a5e198e745553f094e640d810e39a39f350e3197975f15a9e7d4347c195ec", 0xa9}, {&(0x7f0000003f00)="39634041f363ebf46fdc9c7477ff8fb1f89568ba7a88023376c12b582ca107119af1b70f93693e30e3178973db9967358dc3eca030aa4aebd09213c82caac384a9a1becb30babbdf555c5f1903721c669a47cdbc9284f0ac5d82cc635512dd960a64e435fadabad83f", 0x69}, {&(0x7f0000003f80)="e22c52ac1f30bd6d7d61738e4b25fabf9fae162dab0750e3912829f324e1f16033002b620dfe7a50e13f53fe936d745afcc5b7258444fe0c5943d4c563f4539a639f07ce4dc13934aae835d44074ad5121baa5c6a445590e84afeabad73284d01ecb9a5b3daa86374ce508ad5b6f01c0f7ec7c1d53250af1be03e97445692ed7145fc776ce6fdb911ecb05a07ad9c65599d2aa7700c64c05ddb6cae4ccc90bc73c", 0xa1}, {&(0x7f0000004040)="8e891593f4603ea92c1c740c0825668aa1105b45d9c15d2c47525104f6174de5da4e651c8f1b647db63dad417269450e826f43d349a2a2d56f1ba9913318bbd4e423992be16dc00f702746c0bc05e1db044227d34fb3a8cc3c9b1c054ee3daead0d570a6d027de2ef534f3798915e07d931ef09bd5d14e5e", 0x78}, {&(0x7f00000040c0)="bc09abbbce2cbcf63aeb880b73fe80dfb0b23eee3e0115a4169e79f0e73c5cb78de2954637879aed284f1a9c2f39b9270ff84c89189cbbc5569209da67894404f968c095b979abc0d79eb84916a961b20646e57c8c1bce9d092cc7a5d0614ac8a7747429cdd6e2ff71b6eca409cc908b27119ea224b5193922efefaab267bf41a2e5255a5cc1fc1adcb2c4636b79b5b031ef92b395de051e3917c8001cc53a45b52a6132b794fda5e784057fabebac81e78a907566744ea3b80d2301a555c620477b66ba2927fbe5342de720e51d31b096321f82f43725658c8fcc6130ec0c9bbec04cb6d9716dfca15b51e71e8d67f349a656f475db87e404100e58c1467ea7ce13f14a6d417fbe21461fbc1ef0eae55a67cd2f646feb8727f4a66760d05d9ae322cfa58985ced2369b8f264d6909c00ca0c02c519b6bcfe8030af2db5c4a5b093b4bf9a9495a2842b70698268d8403a3a87fed40c0ca8e5200c8ab6df79ac2e50772488a8b961e7f497fc5393dd6a4c56d2b99ae11d4ef59b58ab207fd202befc6196defe5ef4de30a24c3eb271510625c8aecffa11a0b9f8b9d7f3b9dfe86cefd89eef03f653d6b1f20755b8bc6fa3ca1a77e86dd9fee64ea6d7ac4141a839647510744d54fe0c18413c37c7e1c1cb91a26ddbaf07401c2ebf8ccedaf28f9eda6b097107e4db859edcd768e4d6019a3e327d657e9cdb3d662b87d2e71df6bea61f33bcfc340a4731f748b0efef3c0193859ffcddd845208c3e8f52c3a9a7b197223a1138809176994b5b6d788161e57e803aaaacbada121ea435b62e9860e0ff07baafd260c11a010e138e80f50c4e51f1cc88cc739f5fe1306656f43ba410d4e644d1afcb70479da0b3ba9eed74a7424f5b0499f2fadbdf839660295f563875bb4622148fffc3f7351baebc12530233c4f3109aaaa45e0ede58c4d2f2b0f7822f14465aa62f1aa57d4b4299d5005ccb4791609bedd6f6932c5f0d7a6546e6eb0cb745469dd10a5518f774755a0419535e975bd5d0f72d0b12fc52b3bc0bf01df75829eb70a50b4874e6346a35f5ae8805a4576169d87cf22ede93bc89215430416de6b558eb437dce16469daf2c6f67bd75aaf1e66f9b297201ae1d51f3b3c80f28227c8c2b880efe3ce135eeb31ae38f518d939ed95a636f6e5a2e423d5dea39edc1b17c74efd72d162e9caddcfb565e5f086850b1022ae69a37f66b71fd8d66989090b865a3b1dd025555a2915a9db7ec9bd0584def91f416b0b0788ba6c43ca7e36177166484d1f87d00b560204478706fe8c18e8004a662d17361d2e6b6e35f87a64d3edfce6850b19d133cfb7f71032043038b4f1720241acc35f350c3ffc03a29fdd5cb8e9f8fe2ead4a19dc9a4a7986295836c62f03967468808f08aea2d85aacaaf27df5741aec404b221b8ccb7423b9c2aadc52078a0144292e57726e4a85db5308a6f098497502c2cfb7eb839cbc0a44f39fa556a679835d880d48821b30fffe287ec55a9d98fdf2d856625dad729cca84a378bcd17d3b57d8d75fd0069626f1478373ac843203fdc7b9057af6c5e8ca9eb0b6f0ffd3c836c731a9a1b4b3c72a7f30963977a27327d15731d637678d5e8e1e2413fd5ff0d64287cc7c9251c61ced73aed519f32225e0a370ed7449e3b892508ba88171561a65f27ff1842c0b9eb8f9e2824e3c67fa024e8837c1c0b359d100034bf54fd413411e1c452a2ebc35b18efcaeac30840ed35a02ef45a3d24c9b55f24ffb942311d17490fd6bc2862698a918eaef589998a3cc58dfac8305f28ae06281c24a1850c4450dd0311e85aa6c01b1063027514af6e2d1897809624bbd3b6be06fefca713180835fd805991be9442e1d9efb19c5f3bdf6bd40783f71cfd9ad8b85d959bcf4b8cbe5fb647ded7e0cf2dc0274dd963f5831a4461c34aec169715de84dc51941cccfe4e54c549d027a921a5adac68f2c43080451d21ac0dc1651b11b4dc1ae63514ab4fdff2946de7e01f2265b4a21847a7de456cb3f5cc224699478fd17f70384424c088c1131b60522ee924b4f25d0cbd76f7809381cc067628502b4f487d3d8b81241cd470e94efd128a14f78e9bc1c9ce5022fb39b2ed1d068b9b4b93e7b162480265c153895e8747a1f06ea251519fb97fbf8db6e26e20f45012575c8041201515a1056f2ee71666e9b947ee708bc563fd562573a9cdf04f2b2f487875735ded52b17e7bf03a634690e1c3ae34dcccafce6015ecfe11947c491067ba9cea160cf18ec2332eec44ec877c6247bd881833f08b42627c9d0147cde479e0cedb2c77c2a22703d54b101bbd3eb1094d12c506ba0f090473ca8d13893dd384e9c74c5243450d1423ea271ee4a183f9a05c6aef72699caaeea573bd37062b223f9e44a837b7dbd86e036d1eec77cfbdfb009fe3912f157b0e26cf522c15a811757796d8c233f33b74c57a1da2875dcc5de04aeef79cf2bd52cb802ce879125bb7188992e37c94ca10edda7e95cdcd999e1eb0499ca0915a7892091f5eb75215017940b80c30696946808655d82692078168c49c3110e6928f3f1bd5bbd6fa7c0052401806e919708c8998db02336025ae159252378fd648214f5f62ffd322d0c58dec936bf6c27f679f903361d2b9e1f7526810c521ddeae13514611138f16e9c1e651b55e8e5f93297ad644a4309294eebf3b3f868d6d2d78bf9270aa9d5c4115548c2870390b798b6ac56f33ada32b0c9332069c74c2a01cec2df7c7a3d53452d0abaa5ba48748bbdc343d474df9f27b2a89919faf2b7fef5194b93b8d963cac80ede485668e5a2b748750fc87eaae5a5f7dbe5e3eff10ce9d08bc27e923401729b8acefa21509542eab2929d2b3aa35ee6ceff976250fc5787220e773d4dd1d24380d25dc3bcbadac0f24413a9bf11bef04838afc2257fbcb8e671276f0f351ce9e8b90581cfe17c41a5eab365863dca10904b0212dc6da98024764dc757d7105da4b808d36f96b88701636e85742255475c42e9bdb4ed9893e045c93f3a3317777dc1ca910cd2079bfe1a592771fa517252717b5c9fc722d6d89392bb7e9cacd9466576d4c71d3ad29a18ce581a90ddf51722acf09ed92d22f5776af5671cd6c634af2c0a6b0656bb4a5beec1eaeb5d610b45f82cc5018cf591385e559e7a442a7b3b410ec7f31f10c67a44b226769fceb8dd515adca02fcad1b2d35d686232083b20f2f813eb23f8c52d567842906c520df46b95100618f011c8cdbf5ac8e8072e76db6fd054696673a9ce25385e61c5d4afe7d8c1e38a3ced07fc351f36b887b28c2beb36faf9da5b6dcef3ccef800bd185abc2e48b71a93a2f0d1f1caeb76d040cdfcc23ca381825e233e755769759fa5559535bf1afd7e5b8b57386fd730d439cbc52f43563ee7c16d7c0b0a307b3a89ea86d103bfddd57c504c527c43a69894b9aebe9296ffde90c03b869943f0f10d64bbf06067cadc26d3baf1d988d61610de52c683e696094c8315cecc984f79b668d16fba02ab7cc834d4d5e094068c6f43bf16f5cbef14fe43187a48a6df812d41213d653fc361b705008d37bbf5255cc7e08f3835c86ce1c8d160e31a55262026d1d09d2ae03654f5ab9cd7f9b2707c83cd010cdc95cd486985ce71d7171212979836ed57da4fa2c7321fff05d401e2b08dd7b893bff3cb586971ab52e847da66c1ce810cb859cda0003053f7b1acacbb70c682766243bc74a47c26b85866c9b7f30c87b416a269d2f71c937ba182c5819061e26b2921bf962749545fdcb35f35ee1d2b0ee5a6fa375d705cd8ce06cbe20684e9c8d93c80b2a9b02f1e4caa48b6e675982a9847436c36b9f79f1e3c719b9bb55be8d7e0120f2bfd172efd9b44acbaa09f0c259a65df77b800430f2b955f799f8f33c18d225aacf37bf8ba2ea3240cbb892338794d29fa0145163b46d89b8d9211126865ee9c86aa9a170c67502cd1cd220b6420e2901f422e507da019e1cd823609df85f440145951ae0a66cfff4f1e19dc36a8532ec36c72b37fcbc622831867de6342f4edea9a88fcf162d6f85d58dab540db21002fef94ccd69b560ae70081c1990b2f35242936191890f2660c702712777ed0986a510aa72a40d380b4f8521d1b503f4c267d03b0d8eb81420eaf9a853afaa082e71bb4dddb04751de95dccc8b49c83ea732c685c96e76087114e3b035b7b2d52a3739ca5ee8d78457822181aadf76a82e28e236d3ec39107d15ad05866326c6a479bd4470237670adbfdf7def4e607e2eb81e87b7d99151b317c5f6d093ede6eac283721914fe752e39e528902c93988af9445350749ab948bedf9dbef8f39a88e6032712d1d46a2f254b4b814b0a3f75eebdb7dc93309eb508784e186a8bac916f5ee583a79a98f1545e909f034ec6ba80c125235ac0ce85fe9572a3f1b47f57a21557e224e29b788968da32121a3f2611209eaf2f6c128db852b61f8ed00dad1fc23e9899414c067194dbddfc0e85566db2822ba3cd76bb6a14f2d6dbe18716b2582d7b1bb9c0e19c7425a79055209f4936d9d24b56b37eb6b6a8422813c831ac624190943a2d14e93c49d4718f0d1ceca2cf40bb8446b5100d72fbc16ca629e7609c4f003452269b4c6fa7a26c894b39cfab1fb616d5627070cdc85ee1e6552485ab781497b1b9f1b4539a989f1871fdc4683ccd905cec77cc9ebd045367042a733637279e4464ae7d6d0bc029e64a6a58e300d72c900429161d9537a901bb05e2eeaa95e93838ae0bb456fa80266bd91eea886de9eb64a9e6822823d5ee76dee224e980e489a7a71fcc0902eb7cda0153862e6727afb84aaa2f1c304b1c3358f62878b0bd78fab118e0be6ed2d153322aa2e4f599464de81f5836632eeacc2d98fa7ee805f5b831e7fb36f62ac020bf422733988b3f967f47c83359a0581f8895f43387bc052386c2c038f51b761ad51e03caafca9ae4175a63c1c17b15a22d9725735df39f864a41ef37ffb62f0dfa126e2b0714553d1033a01f41aa8b0af6779d6b5707f56b3f4cfc07808d99191bba4f19ee2d18c6adb1ea0b5d6dc94fbbb813511451f7ef0e09676e23ac819fe651471260380b6a11b403d03286ce6ff7bed9167747ca5fe397055c05b5c7b9c99daac84be7ac5ffea4dc4844d17af8ef5b37ff76d3181549d276aecbbc60d7bb223299744a3d388744deb4fc9d7462ed28765802d156c4f3963b7a267fc10af100c2bba95f628162ff315b3a1b6440b227ae5a7f9e8a9a9c78ae5b8529d97b9d42bc554fa68bf44db49bfceb7572723617345c1633f3b90f4979ea4d98c66940273513afaa39bd763ce25f1902b885dd13a6ad1bebc10c88e3385fc056d17364bfc2d930c4af09ab4d18cb1986dce166279d89e4c805f1b145db30747239c441c049e8c20a86ac21e79f242b58cf358b6d4ae3440b31f202e7966b9a5a8aa5f27b08ded55b0717ec810538dad9d678f072a04746c26e96a6815ba64ccbc2082fa2ce8f3d4caa4ad0a16f544dec0afc3f7505cf500da1ae04523f64e75d4368bd5788059fd3cf9fd1d88f7b0222b08b4ae1596a37c8aeebb5e4509edee2d7decbc0394d7492d57feb113b6313282ac6fddfbb58a4e188108d27562bdb60774d5f9cb01c346af334812ea0c2216390b85db23c4d39c94e330419cd9ee8684f73c5cc359b83c5ec4e632e55ba2569cc2f6f68aff5d12894eac666eb4121ea65fab07ff8ac365229b92bd1299b8ebb22ff1c5f3eaadf268ce0e1a6741ee5e9a79c338d6b2605146e7539797924d0dc91c25a3603d", 0x1000}, {&(0x7f00000050c0)="e0d7ee220943f916394438f27eaadeeff594c66b957e6a00cb84d27ee56c274e14159dbb904ff09d7d08b5eada75bac0f8eda4690ad40c7d6b88fcd1e259722b7e997dcb8ffe1d70526a68e8ee3ec68d44f5ffe6d9cd2a0ad0f20d0b8ac5787b2cda94946b32793b2a6dc81f3c9a24322b09fb9c48315ad52df8d94d6b0954ef2c916e07d3118eae1f45498a7f740413186b5596f9afd56596698879c36ff5c704d1707dd6c8e823b4bda905ba0877701c577e2ceca2c5cdb3cac4c14386cda8aefd49ea88c39f674bd303224594543aa07ea07c2255c862b28125eca783ac0fcc621ca3caeb55826b041d8a47e516b1adaa57d936f84685bedb367e9716a08dd6dceb353c6bda745d1f99f59b37bde84b43a514139a6f81730b7ea3c43d67efb883c84c679beb82371680ff12f2b717e8c8e7296d28bdbfb3df828e8826f619db0c4a587052f8a9c1888d9a5d0201dced9d126f0d448a11c8083e171d2ff2e6ad736e659f7f75d56af7a29bf9df75e9f9f5eae82219d0e0ca3297cd94a8c00e9d931fb50015ee7a582824c24040d4f89d36a7644cb2d23d721696a5807f4e1ef45d8f4ce46f840bf16be208d2c0abeec52259682df8f4f1d862d33fa83693652b7b9d871adad042b96fce58998db425a65f10001bba454cd629ceb9ac93acd54372f40239d85d3d38ac4d26b0ed33df58de4d28c6e02561084627e25ee479fae2ee4630c7bd7d3ec21a9f9036d374647309c246d893089d6a54a99853adc00c94b2b25a263241ce2d7b0a08662a60028176966104524d1a73fc096aad055a862502302918cbc23782ecb535eeda6dde6d72a4dca67d1b15cf64e8cab4aa76e2b4dcbf1bb2075bc45501fbbdc1fb1fe87b74de04e3097f41593c768808202d8aff97b07a3712b64de9801c72424e68b9fb42fd298a0d92590254f9061bb26b52911a0237626a2225a7daff85e4470c9314f34369190f7954fdff776cce4a3bd7c95ab7c59ba7341e5fa18210d9cc69be6f2718e6b974b0fe3b92bc3962ed7de0b61566e412aa68659220b44e2db0a7c4419808eeb10e3df3a6c1251095a5b538b0c85b23f1af04da1eb24ce2ebd5559652601a32d38d8a300986dce316047c2262bdf44a0977fa53706d76ef2da7e8608a352ed4b0ef94f3505268b18c12392c659d19604d5ad5b81f9087514fc4b708307ddc67215e508112b86a4d4b8e6743ba58a7e14881f17934685a83017192c12659f0d2b62189cfcfd4a4c0fb29ead76c43c1469fce8bb757d93c897bc0371652e7c01ea2f4d1692d6b0ea599396743c6459a6d7b83b753e18fee57091d8f59efa489107ced7beb2ee5f11cb4d72dba078258e2e88fe4e34ca09a704c433435ccb342d9de6b87ff50f76e16b99ada07528edd19fba8ef08275f54fd7a36e61b175e7ab297e4e7da7c28c634cd7ccf9b22d1e5ed5d361a2f5f89caf7d040947b5b0a30891ce5a0dd3df2f1f4197e3b8112efe8340da4cf439fd7df7571cb29238173bd0f044fc4d17d3e262282da7d2bd37f3767ac0d2ccd9f9d79189fc0f2920bb2c6e04073bbddff4673e636c9be9af677ada4249f9c139bb148a121bff3da4d7c9f8074501e5ccdde01ad31c17d2774d8b41605f7f0b64bdadc0bea5b2b6b4d02a5c699ede9ffb36144ea8fd6465d188310d8e9652c5355e2a0fd7f0617d4b66a2240eb979886b8ca59a30180ff4336afc03c17d7b1d0ed29a3b317d4c0a82fe5873cec68d03e20c329a39079ce34cc7d2e79eb95b9707f6d69b1642153d5494fb768278d01f25c216670afe68978351995dd1cb9098eb57badab7bda10e48e663afefdd68a182ed6f698420b185dd512d0cb305003007ebf02cbc1823daaa82bd5a2a9bda20ad65c114163eeacdf39e857cfb96db556f2318c54d3299fbec4dc6de976ea01d38ec4ad0fbe54f9a25a66d5b78f454dda904b295ebb8c6011fb10a98131afcfa59977945fa59de2559742c6a8f76ea38ec944cd2e541922085ca2ad650699ea4009b38c691e248890096762f2206ea508903bb393ae46de77daf4ea32373ae63e0cc030ec8be74ad12d5e4b6ac2dd10cdef124e5b149441259d2682765ea0a780a492ea9fdd01ab2cebf12c270b771f27185c4ca463c88f201b8c9bd16ebdfee6dc8e1202eacc65191be4bd33ebdee1e3814b78708d3f3f791cbf2911ca98a53874a7976283a9951767e749238de1b9d7b9c94742dc7641e51117ebaf37b74f54f7edd6bb669c898f388644d04a98c5ca6a2b598b784a09c33db49beeb4a148317fb8655ad1a3c5c190a9caca1f9119605d58bc7e4f53cf54ad8bf0f29d30228acc823f42dcf70d7201e345b62500f36f7d79ed052bcec163c85551cbf8bb4021cdf0665008d145f687930a597232678ade82cb2b2910b69343cf47a366dc4ca54f0321e95d6de0d4ee88990fd1d34d82f0556151ab7fc1984eccdec0bae039deacf0c07f1d92bbb5fe523d876d4e57f25a819ed4fa086df82e91b7c514f576d3895c47db7aa925a8a42c6585369a1154c97c8b920802a11b843d25a8ca846499aedbee7af08d827528dcfb41e97c689361185baf364352c4fdee23358b5e20d99ae26cd7bbaaaa0d633f91d744f028cfc1609e3addba71d3def0ee6c5e4c8a22ebd19b097101c23fddd391b7a8be2ffdac2d64e135e1875327cba8c7a0aaa9473753f0fe8968b1a4667d572042a131a14acf4d01c519a1b69dd686ef74c80bc9cb8fba51f4d7adfa4c20250b38ad1232525a443a7aa7900ad2f57d81437406f54e8c918a8022b210fa1987d7e8b3b6dcf07861dd75bd7fdbe59709cabfa179e7fa85b506ef8dd459da1575d62f5e6f0222791f15993f9a1858abb74321588f60a5e6eabcf98399765f9083d834bafe060e3cf0f5225820009d8f5f9cbf1dd91e15f968177953d4ce7ad0a8e785da5154acfd36030f32b3209cab535ae290fc0d264cb738b1e26f3eb529152fadaa863836e686cfa04bcbc69afe10009443d7045ed363890743d38db79b23d94a3f300c6e64412948b17adffe07e55c4f4ef6a4a5448fe78bcaf8ee3b71ee36a95a8162107e95cc74cb4ec2bc522c8ed892f5288e208ab49d4fa8d93ce2a7d188399276f5251a329cfe9aebaee70ed9ad80df91ebb7b515dd3f6920b49cbf9c125dd4634d0a0ae1dd4f775f9cea0b25080b3e835e30bb3ed4833080bf2b4e2fcbb210f760e88ae0d5b0f19dae2ce06e916f803df288c927e7df3622ac62052a7688e26ee2711214ccaf16dc46a733eab4805f4d0a30264d63032d0f88369e30700ca0c973764b14963aeb229b589063c7beb9fd446d7c5495cae7b272da32c0a83982578fc420b1411eda9dcf6dee2924247e0f957dc20178c6f36ff3ff83479ba697a081e9656c8ca85f58cadc44ed5eafd9dfe85ddf31b7cb27a3bcfa48ced8b8e158bc00f3c62add8ff5dd5fa67994c9341b447c5650771fd8b1024d29717f0162b6882d5b686e0f2287c92a4e061e135c7e47912e8c345f3d78bf409fb798dc7e8bbe4f99eaf7659391ec5d636046bba40cb63e0994498ef4ddddf30a4ec639ac8952ac3180577539cd56451ac2f8d77cdc861b397fb882ab3ebdd338181ca4a2d29737c343cf77ea081729e3499e7d7e31fa74fb92377fc010f6ce7e1c9d6b5d4fc66b0d9b0be2de13a792005dd1e9f39a4e297d3ba26b94c537102ebfc237c1db776382169330e3405e291e54183899283e7a801a35da953a2d534523e3222b8c4b8573e45a99c690fe529c426574c4ad9aea01dfbf6077d92873c3cac8af0386dc1f60ee636aebc34e0f542a5fd4c607a47339a4a8991b451ff28e54241a016a02cb4cf69b42e672af134ebeb45606c08aecb762ab429cd923ec0498464e1fcae388ba773dae3e3c7fa49cef068e8124cf4e3724b4ef54ce02da930dbac81db58a4b0b7e5f9850b12f0a82e3e1bb613ba9dd60cecf004f76affe17a3fc8b4d7101a14dd67e536e5925ccade599fb358d894c4da18339989fa5d7c6f5a672e0cc3c0455d8e2aedf5dfb01f38628dceebc7f81a9e21f3b639e3ef5c2cb10e2e15382d90a52eb940843f1187ec02f4274b464418b69f6c9538fa3635395ddfba67c99518e4cc94bb7dbe1613df9a4427035bd71d3d7e887a84fc69d830c4f053e3823e6ff981aaa831231b9d68b8981ad48f35973f6b94b1c5e9e80d0fd64e22c55cbc5257ac28337eab20d1cb278a22997e8c5ccc5bc8fb1da72335be9654cf787aaf058430b0b9a67b568da62481f2d0727c2ba72426551fb36c87374a8e7e73d25c314610144e5312da95427d6eee36232e09c829d374953fe597b02e44372ea680546cfdef18819a0fe0435b658099403302d8235bbcb2d99c48345c21887f3dd2336440616ca84fc09370db14b7e970a45989f67d68cbc500650b9bfd4654168b10101585908b9e459b8baa28cbe676ebc59c2d597d2c51629309b64d1140bec27855be0e0d26ab986adf1125b2ca0f095e3c6cb8a5cada9607eda65019136a1cb0ddebac69b4fe1c7fb55f6429f8d62a121a204ae6fba23607998c24a5c24ab756f06269c8b7b87bcd5e835fd0a6bcf4cdf5a5557bd653df731ffd5a32f751c5caa275e831fb02d0e76c05d29f99272abcf17a382e4c3da7932a2124ca50a2788b01ddc2e299f0a8bf3d2496eef8bb05e67bcfb1c890424bcfd7842d859e62d7ed738c584aaf9664d173059eb03fcd61f68f1117acbac06a5974a83d622ec1dbea86b3074f84ad136b389d4433c57411447eb345be4cd5e9016f1d5ce0009e316c3f837b788bcc7d3e9317521100f1ec980d102a7cfb8b8fbfcb445f0fec008bc92d71544f1f892c40eca969a5f9e5839c80894798077427f7c5464f22768a5456dc575aae758af9ce6a6b754be11b84aad2d191d65d945a3920c37d79622666cf40d360cf160d2a220a8db36ffc06637de66d0792b2edfdb51b2e4dc79a4bc5e98a9a60c339fc67af1d54245d9ede6ef3392af07d2e64eb01ac5c69c621d787244e9c12695167db104bb24bf9499639a7e6969f98cc720da8957b576c4bb51d6d9294033063b12406e751b6c6f42abfa4394c7775f1c2cc2367c7d5072adec2f6273fdace28114e007df6ab1de4aaed730ead0826f2f1345aa5b71bb80621a5676492f1a8c1276b2b8ece0b93032e97f99612f800b871543d5ce74e70b781464985ec38ac070b7bd30b30d4e8401f0363ec793e1718bbd1509d0e31d8d3cc18f7ecf1e5ffd7c80798d2da0e38a32ad3ee4d49c0267385e0056a67b1c9527c2ba4c058622d74933fd5e3598f63e05dec02fcaa409d2088a033d857aef42ebe8eb92bf47a3e4e5b58ccd640d107d69399f25643403badd00455556d7d47c7ab8f4ceee594a57b3ad4a0510086629c4be9914489831e1b876f64ac60681e4400ed3a1a405f5741484f5c3be55bfe1940731312e81fe984433433f43194be18b9e5521a217e7288c2aa28294a677e2e559bb4606f6e170bdfa46831a2c10bb05d25ff50d19fa227abb0617f4ca614731c081137165b81eb0ce732bfac43a9f5eb1c1b85ee6d97972d42d732eb978e3e2987d56aad98e36c6154e07b489303ba2bf98a26f3b8b2c43c1709fdd142074cf51097bb32a032c5c0d966b62fca0ec6d4970361c8c24be2e0b4831cbc78b2cb4f0428b4ead55db90452fb2a32597b647c27097450e950164cc98ced31fd98e9b24b0f32739c71b266431e13257347822afa7659b0f1c5b6a7ae7eb0caa95e534c56621e70cbe249d", 0x1000}, {&(0x7f00000060c0)="3de79f889031b3a64a548992b45a979f25fd05414a77ed39721e312454f0d6a7a89bce649df2a0dad73bb59d5fbe25198189f238c87bd2e8d1a9e9ce763c4568493008955a579da4082c8cf7ed6eff02a7dac0a91f9f", 0x56}], 0xa, &(0x7f0000006300)=[@init={0x18, 0x84, 0x0, {0x4, 0x1, 0x4}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x64010101}, @sndrcv={0x30, 0x84, 0x1, {0xfff1, 0xf, 0x20c, 0x7fffffff, 0x5, 0x1000, 0x8, 0x3, r5}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0xa88, 0x2, 0x63, 0xffff, 0x100, 0x3, 0xffffffff, r6}}, @init={0x18, 0x84, 0x0, {0x0, 0x9, 0xe1, 0x7}}, @init={0x18, 0x84, 0x0, {0x253, 0x1, 0x5, 0x9}}], 0xc0, 0x4800}, {&(0x7f00000063c0)=@in6={0xa, 0x4e20, 0xd8f1, @mcast2}, 0x1c, &(0x7f0000006980)=[{&(0x7f0000006400)="38b863ec68e4153bbf4885bb8b8497a541b83f160a8000e50fd11f95b59cbe70347add0f34dae1552a6cef2d4c5840207073b752c3e22f1a", 0x38}, {&(0x7f0000006440)="667c6759a556ab15b39351320b545b22024eb09797b008275ba560029b9b55f255f4adeb7a5f18fde5734c874d599b86ea6e66d7e8a58be0558c5eb5866b3bf2a2db15db2932e64830297b0bc1f091ea303be744a3b3142b37600c85902027853c3a3157de31cdff3f9ff5bb18803e1037eafe079ab63bc6ccc29f0583ddc30e6a0a77a52cb2140077cfaa1de0c19e81f1e915c5a41104e2ef9c6f4d8eb20af4cb103bed894b405636750e66b200d059febc6a1e2f602e732db4e60994d2111b2b410b9e12cd03422f567abaa36dca268f78", 0xd2}, {&(0x7f0000006540)="8cdd24581e5922fe82267c0206e479ed2617fd36bd3f8aaad78efd4565c697afc48b36ec59dbf80fc791d36a18c647c393621e72924c4efc2b4c1354f5a22eab5024632b56a316b5567088f6d83c9269fd4da0d32f174019424e29f6970e378cc93886c377c0c2690d4b461f91ec670f13cc0b011407341f385de809f205b95b3cb91d8dccc96d6a43057251569b7cc0a6518b7ff1cadd13f74a6742e42942c2863bb007963aaa3107b464b59e3b5f84e60a6258e97a37219cf103ff", 0xbc}, {&(0x7f0000006600)="52adc8171651b068579579b6ba8e272ecab3ecfa748d4183ca7e081061bccc85aeca6741f3b13651bc23af2a2652b0d5046c9a3cb89b989fcf9dfbd11be3334c94e0217ffd758f93bd56fa1649b44208a6e9dd1bd581938aa300156d3c1da75f0f5a8e16cf5706f62afb40ef10c6f01e9997f951aef7eb062f6a4ab33fb761354460", 0x82}, {&(0x7f00000066c0)="e9d7edae939d2cda9706db6764b411cb106cded6fedc2b147a70e2d4213d64ab532ffd50eb61e4df92557e6b07a647bb9e5815edd6fd799377d10dd882cb1fcfe44321", 0x43}, {&(0x7f0000006740)="c365704bab1007516db1", 0xa}, {&(0x7f0000006780)="c1c66508c101ed332cc9cdac31dff4667869e9a05cefd0a3a2db842024541d8804cd8e9ed31c75230410c660efb79e00a35d8f94de147069b439f5f841925c7259e97faaf1a2d3cae2dfdf235a8112d1a4f104444a9313abb77bc9a6e1e86d4fd2fa34e71525594b8c3f3367fe57a11b7c93ab66db938960fea8e1994fa7926f545bd8ebff5f7ae71aaacbcdb745cf213caef5e07d780b30ab4fb0c58bddbdb8f7fa543fac7ae4207fc70b270695007fd9418575f54b56740348a330cdbea37b5a79ba2da5a975c26845890c2f25336a61fc7adf", 0xd4}, {&(0x7f0000006880)="5e08ec1f7321eadddad5dee9a649a52a0543f63d93a1979668dd7fa967925abf95a03ba13eb11c323f4c34b05eb9089ef7fb346a7dc354f6b42b314f5be1fd945730796aa0dc49200ea8c792df376b275d6dda624798e51787954f14ae2fc0848437d11bc874f6ebbd3800469887e4cecca56d5683c40bffc7b55f5cd1018d1e9471336b5e15255e25c8ee58472973d6d632f22cd13d1b939f57865fe9855084de3197a28c50788fc2b86e96abfb1b16db0dc6c0f7ea0010ea05ce129279268d449b06a4405af8c999a045bf569d4afebafb1291a477c22f7adca6247b915d50e88d1a04c4c39e34d01dd412a1592998ea5524c8", 0xf4}], 0x8, &(0x7f0000006a80)=[@sndinfo={0x20, 0x84, 0x2, {0x40, 0x8008, 0x3, 0x6000, r7}}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}], 0x40}, {&(0x7f0000006ac0)=@in6={0xa, 0x4e20, 0x3, @private1, 0xc}, 0x1c, &(0x7f0000006dc0)=[{&(0x7f0000006b00)="f7db0762c3e0c18e1a671ed3eec04a5e3ee09c3e098bd78eb18eb537fa1778b2b61350255aa3976de5243206fa7389eef8f79143ef793220470375c06c85ca1403bf018a477269d3857804344df16f247a2afec16dc96d8aa58a09e9b0f6b536c5b9728ce5110174108d39a0eba9dc28c081021b64bab163c93bed34e289979336bd184838cda6bdaa3f8e625bcfcdc5771317a45de4ec855f57e830080a0452685c8dcc88e1d80229557b735159448ca9644e818b0c7707589d28357568934c98d180a3cb04645a8d1706356b824c4be4bc75", 0xd3}, {&(0x7f0000006c00)="94c92de78f5ccab0e85598e00000d1e61c4fe2b1f4179d932d89a2a7c3b57b59d88407fa5b02e5966d97a941a108dff863070ba27cb4a7ca8b133d759e5b58780bf3dd75481c6746f0c4c8debce65f17349e2191c5205e57845314fdac353ce239e7829454f28a7fab5a0ac16c872eadb23266e08a598e382b386b86840c8a0e28c93057799253e263a28fd940241f93925be3ecb47cbf8728", 0x99}, {&(0x7f0000006cc0)="f68e20846888d4fa138a24cadb74ca4dd27bab27721ffa7437084abe965d532ea8185923d274cf3cb9b5f0a06bd369b86d106df6853245b6f5332ec30517e40cd34ffc02be7f27a4e6d8c339e75e906d27edb65c294c19f9f751cd60bdb8153977ddf52cd6b8e991f9efe7862e92ab434a370b99040a34e4e469b5cd697f5787ab29e2d9bb321ddb1e2edc613069d18f325053412cff", 0x96}, {&(0x7f0000006d80)="4f93e98c0f498e682a11c1cb4d6997983c98ae263b597304ce", 0x19}], 0x4, &(0x7f0000006e00)=[@sndinfo={0x20, 0x84, 0x2, {0x7ff, 0x204, 0x4, 0x8}}, @init={0x18, 0x84, 0x0, {0x7, 0x401, 0x8, 0x4}}], 0x38, 0x20048040}, {&(0x7f0000006e40)=@in={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000008340)=[{&(0x7f0000006e80)="ad07000dfeadb8d46b5c90c1f5dd47ba226f34a38e15d2991d55b8ef8bc3f758ecd47107a75fc4e5fe6879dadadb802abd4e9fa629e4f9cbd05799b860fd77ce0d6145d282a062a7e093898ba7", 0x4d}, {&(0x7f0000006f00)="87072ed9da64f3f3762d81b0aa9be980f878f454bfb44ca6a5c3e8a71cf81e64621c15ec74b920d2dce554330abadce587984f6f8820edd9cd2010be5ccb49849ddf258eb7263625e0c932332f761c596570cc04bfe4f90af8cecfc66722ee58fbe09c164be426573ea3dfa4af4a1ff2f03eaaa1e6377a5f3f38e85ff709c646c60c2d9fec2d7e30f0ecfe4e1c030a149772c69127747f4998b2ce41c0f83e7ab8796a91ae446208803f137761e49543d6b0b98206188b4edd67e9f8346b9e75e201fa8a8da907c396d8e4bf6ea70fad9aacc8c2dbb94d3e20a16242feb38c27af6666c5e90a0254be3e8c996e6c37641771", 0xf2}, {&(0x7f0000007000)="528c5c61c7e5b93dc8864cc820eb699c5d152cf4b30f34b21a87ba67be10799871c246211e45dad37d0fb9bdb2", 0x2d}, {&(0x7f0000007040)="2a88b55e12d4569da12a641a574f43b07ad005dfaf345036c939048a6e7113a96f7e7e47f50dc71b8617637d9430f3ee75de4b5e58a72760062f05eb5e5fb38bed76a54e4306da5f6c2d223cdf4a52e4b4647ddfeaccc17e6a7d3dce0e6d860217a14bee72883ca023097d37df5bc189783cc7bf58171010e85173ab30af5f3f4db0d8bc9d805d66eb0c8fba041466626da206e7520841477123dfd5da03c473c2b00080c0051a3a74374fa09c57ba70145852b905fc83c1779c06c08409b12fe7dc61b009ea4f8e9bf5bc75d9ceb96329ac8580d6883d908fb121fd3b205f96663248111d19177130163353c92ee9165431808985", 0xf5}, {&(0x7f0000007140)="fad4a9299b629e8e6b0bdf9cda0dd09dca", 0x11}, {&(0x7f0000007180)="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", 0x1000}, {&(0x7f0000008180)="5112490698fd0649eb830b909a874a966def0fc20b4dab87efd2eb208870348c7332773deffc0719c3a686bd7a05a691fbab010d096dd31bd311bbfa849d9dad533506ee19abd08dfdca9448c0aa232b1e440c3ecf8180281a8b6e1a0d", 0x5d}, {&(0x7f0000008200)="e8e117a02da8e3bbeb250adae0466d20164988f092296fba79927943afdc03cd4d305a688ceeba08565fd9cee9c12c3b1ecafa7575b0eb11333cb57605ee06083707ab774b8e3ccfc10f2309a1ba12da5a0294f0d6c49bd57df2972e3b2bf79b4cb185", 0x63}, {&(0x7f0000008280)="0141ea6d56b75352c3dd8ea547c1ec7c2e6b7d2a79e5e8b5cd24b663aea54b85d6b271a5ed37fff9e6611dbebd6f000bb3c3c044180e3f7df14735c18bbd5aefe4065b0fbe14365dfeecd6c2983581481d0ad78bbb31447f4278c2290cce75c92d10a7f4f27b643f6ef07a1652c34d85090e49ddac7ec092da8500cad435160d53e302270e701c561fd47524d8", 0x8d}], 0x9, &(0x7f0000008400)=[@dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @init={0x18, 0x84, 0x0, {0x3, 0x0, 0x3, 0x10}}], 0x38}, {&(0x7f0000008440)=@in6={0xa, 0x4e24, 0x40, @private0={0xfc, 0x0, '\x00', 0x1}, 0x9}, 0x1c, &(0x7f0000008740)=[{&(0x7f0000008480)="0fa3ebf19c937bbf", 0x8}, {&(0x7f00000084c0)="5e0505c9fcb7c07710da31b6fe3886d82781bffe302af62d063dbaad35e7830af1212cf3d3616026326516ffde0e33a54fe25de76e85888da204218050e4d548943ed78c5452c46728e6f7f76a4cf5f12d3a31dced824841b39b32c767d0faf1ef5e8f5df7", 0x65}, {&(0x7f0000008540)="b24e3c81d9ef8da293715d9807a46a0761bc7fe433fe57ac97507ed43a1a5431d7bde48441b6c0d786f614fd6cd2f7ece1c2389231f5125db9602dac750b348b88ec37cc2bb5eef2b0038f80d1d627fcf91bb471e6be2b70e7a29f9b981f8274a5935e5d017e45089485b74ff3f3a63d41d474cd681f5b4f04d0571bf90716b0e1d9198f70a83f801bbef159f2fb7556adb1b7663d64d96a", 0x98}, {&(0x7f0000008600)="b3639c57649614c7b2bfcca87ee6df2e1f546bd1cddb1a3e199815d8b3800b3dab243a04d773745ed1f6bdd8153360dba6854da51002363264303976c0940aebb4474754714fcf403f4a4a5a4af980500ac80ac8c9552fee2ffe16c34180690af2eb108be9fbc6758cc9fcc0d1b58a330c508e79e8c3aaea89335ec8f42f94b248065d5cbe5a25990e897ac04428c5bcfbffb3003ce7a4e29ae8ef5c0c5c5da986a25a09f6e5c7235650ee6413686d23eef08d1a730879346d8eb67348e29409ea8f8feb5e59f7088a337ff4adb804ad76275350c7", 0xd5}, {&(0x7f0000008700)="21860d4cbbd1c1965f44e5", 0xb}], 0x5, &(0x7f00000087c0)=[@prinfo={0x18, 0x84, 0x5, {0x20, 0x6bc}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x1}}, @prinfo={0x18, 0x84, 0x5, {0x10}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @authinfo={0x18, 0x84, 0x6, {0x9}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @init={0x18, 0x84, 0x0, {0x80, 0x4, 0x8001}}], 0xb0, 0x805}], 0x7, 0x880) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008a80)=@generic={&(0x7f0000008a40)='./file0\x00', r3}, 0x18) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000008ac0)={0x1, 'veth1_to_hsr\x00', {}, 0x5}) recvmmsg$unix(r3, &(0x7f000000bd00)=[{{&(0x7f0000008b00), 0x6e, &(0x7f0000008c40)=[{&(0x7f0000008b80)=""/180, 0xb4}], 0x1, &(0x7f0000008c80)=[@rights={{0x10}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{&(0x7f0000008d80), 0x6e, &(0x7f0000009040)=[{&(0x7f0000008e00)=""/130, 0x82}, {&(0x7f0000008ec0)=""/17, 0x11}, {&(0x7f0000008f00)=""/26, 0x1a}, {&(0x7f0000008f40)=""/223, 0xdf}], 0x4, &(0x7f0000009080)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}}, {{&(0x7f0000009100), 0x6e, &(0x7f0000009280)=[{&(0x7f0000009180)=""/24, 0x18}, {&(0x7f00000091c0)=""/38, 0x26}, {&(0x7f0000009200)=""/83, 0x53}], 0x3, &(0x7f00000092c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000009380), 0x6e, &(0x7f000000a500)=[{&(0x7f0000009400)=""/63, 0x3f}, {&(0x7f0000009440)=""/143, 0x8f}, {&(0x7f0000009500)=""/4096, 0x1000}], 0x3, &(0x7f000000a540)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f000000a580)=@abs, 0x6e, &(0x7f000000bb00)=[{&(0x7f000000a600)=""/231, 0xe7}, {&(0x7f000000a700)=""/4096, 0x1000}, {&(0x7f000000b700)=""/216, 0xd8}, {&(0x7f000000b800)=""/216, 0xd8}, {&(0x7f000000b900)=""/211, 0xd3}, {&(0x7f000000ba00)=""/190, 0xbe}, {&(0x7f000000bac0)=""/60, 0x3c}], 0x7}}, {{&(0x7f000000bb80), 0x6e, &(0x7f000000bc40)=[{&(0x7f000000bc00)=""/24, 0x18}], 0x1, &(0x7f000000bc80)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60}}], 0x6, 0x0, &(0x7f000000be80)={0x77359400}) r20 = syz_genetlink_get_family_id$tipc2(&(0x7f000000bf00), r14) sendmsg$TIPC_NL_KEY_SET(r13, &(0x7f000000bfc0)={&(0x7f000000bec0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f000000bf80)={&(0x7f000000bf40)={0x28, r20, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40090}, 0x20000000) close_range(r10, r19, 0x2) ioctl$BLKTRACESTART(r14, 0x1274, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r12, 0x84, 0x6d, &(0x7f000000c000)={r6, 0x1000, "58110e9962aa1f62f3508025a794d4978307a45986e61d96dda5041ba9b285e878acce2d6c240f889b6b88336eebb8f072b3e764b649cf5450ba32d89a91b96ccc6673553d345341305b6c615c3b32b817f00c93e5480981092df1aae1c7a13a87f8e617404290192363077e02b606565db5ed72ecdf644039c6d5d79d5aefa64840ac6935023697699ec5dbd99857c42d0a19e574e93c1e2e51eaeefe4df34cb57090f2ec8b977cf322d1923385285dd9f1fe0991439eac6694c8a2434abc7c4f810dcac7dfd527de98b5c3a7f4040c9144c8d8781ee12b4955bff0e58c5717b93e898ad7d1104ff153ebaa5cb2ccdbce20108c5bf2522fe2c5b504ae9b670e1e180465ebe505fabb1e1fcca39def31f73efe751f5296e2a25b8a9c07e626fb4df6b119a68d9810785bac73cc5e5ed2c222756694713ce615178c56c25ae97c6c189edac3799e5253a2cc809cb5badc4b67b35a331fbe99cf69f1754cf8f8c5d0a67b32dec59b7b79d4482a47079463808206423299494a59507496789903212f38f176fd186a627712ae67532282747eb58e84b01bd6e87e28a1f717ace8257a7000fddc8c864522e8a6981c305bb7c63dfa5f3a2419f09ae3959c3b31ead6bf185ee9c11978b70b15ded2cbf6aaf10731a9c3458d87de8e758bdf0fee71493693fdce6bc14054743ead860cf085688e51e637cbc657912d038604400bbd38ad4b9b06b44745340edfcc451ffe65c2e4b423d0b7647c9d79d8bcd75ffafae21398bd00b658c28de28ee8ffbdc1972c80d46019660ac6abdf015f00868d164052fffc7776bb0a5fa855dbf479c296b8802709d3276c3674255ebce896292612ee590116055281b2ea4f8e9909218f7ccc75000219fb5b79207ef0f1ddccef0c0f4eb073674221e4b6e184e381318a75d5179da7c0cd6cba1da9eb49f80c8e4edbf20acbb9035c0743eb8afe334a6400158703e546e50d90721392885fbe6be2b0ad553ba2cb3d3d54a16197534187488bac8a4ac82559b27ee1ed7c2dba9cf231b39bdfc67c25f17d5351657867b39f534f7871b8a8e06ea65f2dacd3ff3d3ad81f43d3c263434bb4ff95ba8968689729ac552d4a52f4abc8d7821090db7ab443f17eeab08d8c5a352f9c64cb63068c27dc70351f97830be3a27ece8b14d9516a0a5e37eb765ab7ffcaabbbb25369e460638c586ac8ebed255e5a8a90e0d0b4d0848cf4b82d66f192452a6086865b1d51eccf20689b35240e74ec967f301ddd727e8ea68fb20cd4d4ccf1bc503b9eb12e85b544e4a32836fc4238463d6badf68e73f160215f1fc05dea2a87feb3e9dab68e4c3dea789d2c703561d7f62c0f35a791b9e1aae1618765bb3ed98ff421eb65b6f087d4eb15968dc837da305663b7807d2387623388d0c52c48409fb02f1ba7c0384bfa9c64a31a1e4b6912618c2e0f534c54fe3fed02564cf749dc2eb70377d37f7ef7dc54dd2e4a9cd0eb743e28af88951646c30affc1a7aa4d063acc82e6edb4c477376b1ad0c10fab533dac3c1f24aadcf65fecf74990288bbe107d68a350412afd420887bb86ceecc6708b1730fc6940a0affdfaccf1a47988f6a3b469f354445934cae0ca4f1c895a80696eb60eed86782a2917b2f674a957175c9db1d298f4b1555debd533cc774a667cf0b12bfd2b00ee02d18cd837b108d4232d1d974618cc57d3451e19d2c1b125c5d734b7a451906c2a877cffcf6bf986a8dcaaa793d3dd065b810555ad1ba57f003139152a57c9f6d0cb7812acb90bbacc38ce1d24e355cfeea67ab075414d2efe0a0db28bf14f57a3a78ea51c7fb47661a2b51239923a0ccf6016e9d55707471167b0cd0e22493519a87e8fe1ef1273bccad439d25e3b9f7588e1ae23d708a22dfe3581cd7a409d29e86e2127871306dc008c98956384d7ce9257763cfc8afb4a5687e724038d408dbd87504158552f07b5c3852ab393945bc5d14f01345403aae7a6e7de05d1e58f000f66b3e7ec610d904b26440d1efc350cba31c4ffbe3069c6a7100a836b0b0d5db681ee7fcab44adc543d8467f4ecdb282fe662c892d989f4b2a98cff463349658a487958470c4316c404d80cedc59038fb68964f9b16631b5b384e2385e9da2f4df612fd5644312fb7ef5a0efaf22dcd0eb058e924b9b05aacc07e4542748f4b91a43774f43608b59859ef7669ec8414ddf07c13acc3ab09336ff4e3749b93341b54c2654b2932761ea054e20d5fcba771b6691245752b3c47f8c13592c46f3bb42aefc28737bed4be6ecdc716a5404307ba8b39e89f34ec53d9ed94a272d925df4fc0192a41ffc22907651be0e21dbb0723212ccc9457b73d599b70769e941d6c7b9c086f218591d45aac563d3d005fc21e120624999e2cb4f6033b6c0af37f9de3bc82103b980d17e93a07c57393c8e3856eb5ef56cb7bd9bd7e2417f2e6a819d460ebbe358ef2e707ede534111314b5a7d1d4d9b07bf925b18a513617dd422e6f11ed66f7b415edf32cff79e3d5b0631a6e5c64d335e25bb41b5bfdfdc3b9a5466260be48e7cef1f2d94a9d15baad646365e999ba0d3c6d3dab80e293730013ac5b769954a055b1c742d2e9cf1d988ac96f68e44b5a6c8c48f81ed9de2b44b91d7075cc11aefa5a6cdb1604806beaeb296c3df08642cb87495f1d1fba4dcfe923393fb04a42eaff8c6c28a072d2ef0eb4a6c8603ca8af8f3729af51fa8b9c4ae81234a0885e2cf110b7d710ec2676cc9053a5ab9c1fbb13a1d5edf366256e81e9a6260d01992ac54a5988123b9c4bf6d9df467e5b9220f43bedc84852311a1924ddc3e4f70b8e00037112b972b7b8f81b08b4ee691c34dac50cbfcbc311237b688ebe36e640c62069bea84d6c239773f36fd01ed0bd5c25f776970a87408b31529a3811afaf8920e01c1047d925f3a0080ff43a473c99787ef21f7ee77b45f6debcacf5dcd1d1404549994572cc6f68a9fbf68cfd70fb8effebc7bcc3ff6b8e9cc6c6ac157b115ce656f21006ab39f51207952f7d6b5abad9b11e8b94cbfc8e239d6073f93bdb2576c0c909a3ce2abf6637e5035c537659f470e0c333a6ee44d11af1f193b3c650e41a370e1da1fc53b4fb58aaccc5a624b245499c8027dba0bc53dadd6971dd29e069eb9234aa2d280d238ec642eded03b2defcfbeb607b9ab6f20a887d1ebb275a57cdab660d383d3b51a9573cae49e79b74e8b14d902434952378d573faf18f861b49fccb23d3428e6fb357d413f5bc23a42bb241ebc07a3075800cb7ddd44560ff3b0b9e4f2410a007898fdc2a88479f0533022e823fc800f3cd2ac83923a06663263091fb30ecc7b3965d70d5f783ca9780b022b5fadf7a9762ed41135deebaff64aa91746285fdf92a99e1f8d7c6774154f0d4c051805772c5dd164c5d4d93234f3346413060f30c371b8135a918d1f6a35d7da3e2d61bdcd13aa3b2053d9bc65ab0e1cb30b7b339fe3d4cff3f0f4802f41539615b19c32ac86958c62012ffc94aca076a12050df943611f34f82789fd88a6e0039351624cd3d9082ced796fda7e6ecedb6e30407f5346312dadf35109a8c7360258214f6ff231b668a0599f7284d4d8c35cb5873ace15f52e0e9264740fb0223aa5bde8b47cb4f1fed84016acb6664f8ce29a5977f4db9ed8d2103229478e3cb86948ed63ec819b6b2a8cb9b2bea6bae67a5ad0b5e23747fc13e9ac252fe942b477997b86e97d9e37f5604173e4ecd4ba29ed4e4ab632ab9d385564520aebeb1ca5b520360ada496b19b7e288892d16c8615a8f4bad0c19afc4db3fb3a136af8b370f1da00213ec5376ef616a3c1529ec0c8cd11169ceaa9e40042863821eaf4c5acd7e7ae614b85e5b26653b13fac173566d21595945d5b380f9c41e55de9604f936a36e6c3d9dfa5a6fe752072c740ac3f988484f2f2c7e86e1ea509eb214bc1f3f4a3170e6faf87d920e8818c56932560d1ca719bef75d8c529fe90e05fcb364180862173787d258eefb5006435a4f63b2e0777abea2de028b1f12a7a2c6ca27998d64ff71f959002c6700d4ad9c75f5a59a97bb2830e452c500a1630c36df1a0f7e498b5632388b9a05f521fb0d15f705092fdebd9093f419056c2526d895355963ce566e1080e39955a05ea83b0f2c46bca9c5e604d2b2b9bc158ab7af5590614e5d7675463d4f2a3f66e33332e078ffc3b3fd73e8e3d64186e11b5ecb24cc872433feaae1088dfb048d0e149212d257c6a914c70d9024d367b92ce7bb13f4ade0e6366f913301141d14519b20c665ec42da89ee7246122b668aaf84d056e0ded65983f2e132bc21a84400807d4574d379496ebde63a07c694029e5227c44c1a37e411728417708c1ceab316700eb971114cc3376c7ff9e1ec84f6e747eea0c5feb45082eb905871669d80757e35fb6718e1aa319ea74d513610c80ab0f49645148cc97290d03ef23885763bd09394a2494d5e808440caf00e14a54435b2d2dfb985e4cfbc69d30ac5bcd374b3bb2f8ed058aaf546e39016c29c2e9b60a5581aa9a92b60522e5e6c6b7abb459e29b061173094bd725926fb4f6e4f25e8aa7af485ad309baade4418b46bceef19f4121bd2da66aa471a5ef24d0e78f93038c7f28dd0835e332747065bf0e742b01c6d83f98df34f1e550e41c7bf4b012758d6828d44ee7641e9357496a2a0d971dce2b2f03f282e912236e4852a63b0ccd813f34e5f5e271b42606d02a8fd5fc57d316d73902ae725051134aa72c8491a69455ce07e896031c6efe133f4b16af10be8290d4ee37d01717142c1055095329e74469989c8a4291c3a5bda4fd6313d0601b3ed2e4ac0cf1d23dedb468a72ef35ab9c046185e552dc2fc640155800939864b356344487adbef4f21c6d5f993fda54bdf3d0c9a44e4610f816964acb10564af2b165d15b45a5f45f0dce87f224b9382faaa286c7f5fdf42cf1716a5d3bdfaf8324636bc12f9ef74a85da91a7854e4e75ea2848772a2ab3b393acb6b4095d7e849c53b78730e6e0031be6a89698407ebbe17002398c6e804ea7abf27ee2a05799368bb7d75a182abc56b1016cfd3e6406e6eee909361f1d3a72933ff5c29e30d99c62276bb73f16c7262e8fb873ba2b1254a9ffbb1a271a2e48fc0ee9107f568837696cfba744f2566ce37981c1d2e9be829141c5afbd931987c285cddaa771ed8f0846aedf30e3cf5e78a1fdf689213997ffa0cfd83fa93fc88f5cfb81a8a6bde8c898f1654cbe1c4b36fc9fee345e6367a6b7301705305b909ce2ddce3b426c9e9d01684c9c984609dfa1fbbfa79b5e7e7ad7622b84972ce4830a5785b95b827c09220b07c0ee024197b59f0f0ebe69090833272b03a8bd07584e4462b5dd1fcd941d8f5aba407650c24717596178282dc7b409b68f524b7ed72c46c049a295ec762d7493b369cfbdf7d0db285c95dd46672762b59e31df2725a11a600f5936e14d98312495116b49ea8d6f2d8a91bdaa20c15a92ff4572b80e7040d4e03d259f47f91e112968e1ed94fd3641e701e3cd25dfaee5ddb988f90cbdeb5ea484dafdaabfd2e7e6a21944ea7251a6ee9ac04ded3061f13f9de5775bd8677b28f794c9c1e6c6d5e97453b291d97764c604863c7229cab8552ef110fca1edaad65d6cb24b24b8a28847f260e131157b4381dbf566422b8586f87295df11de02c15a888cc93ba67f4e6273726ff5f98c315660e302ee75e837872e179997493874c1159e4d8fe0e61ff6c52b66f28e1fb672d0ef97386cd66ab3570d9b8d586da353298dfe22f9aeaaee"}, &(0x7f000000d040)=0x1008) close(r2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r10, 0xc018937b, &(0x7f000000d080)={{0x1, 0x1, 0x18, r8, {r16, r17}}, './file0\x00'}) write$char_usb(r21, &(0x7f000000d0c0)="8c92770f8ce012dfd69980386e85fc3ac60f990f3afb78ba29c2ab6bc8e6b4f6f2052114ad83df35f0d6c737237459e7a00707c41307134b21a73a4b3ec97d00edef17bd4fc07ae9f6ba4e3bf0a86dd00fabab9ad5897e62c09495e0fdf311d37635a2ceb4e5af0cbced3110e43b15215c685556ea36dd076823faf1872d9913e6288e2b02", 0x85) sendmsg$IPVS_CMD_GET_SERVICE(r18, &(0x7f000000d380)={&(0x7f000000d180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f000000d340)={&(0x7f000000d1c0)={0x160, r1, 0x6be2fdc99bc50c32, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x54, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x25}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macvlan1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x34}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private2={0xfc, 0x2, '\x00', 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000000) ioctl$BTRFS_IOC_START_SYNC(r11, 0x80089418, &(0x7f000000d3c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r15, 0xc0096616, &(0x7f000000d400)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$EXT4_IOC_SETFSUUID(r9, 0x4008662c, &(0x7f000000d440)={0x10, 0x0, "2474b0d4a9876a9ed2c1b8cfaea5d4ff"}) 24.006028642s ago: executing program 0 (id=2735): sync() sync() sync() sync() sync() sync() sync() sync() sync() sync() sync() sync() sync() r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x80000, 0x80, 0x8}, 0x18) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x35) prctl$PR_SET_TIMERSLACK(0x1d, 0x829) sync() sync() mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0xa0) sync() sync() mount(&(0x7f0000000100)=@nullb, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='iso9660\x00', 0x200801, &(0x7f00000001c0)='\x00') sync() getrusage(0xffffffffffffffff, &(0x7f0000000200)) lsetxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300), &(0x7f0000000340), 0x2, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='ntfs\x00', 0x922020, &(0x7f0000000440)='}.\x00') sync() mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x42) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x4c, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x76af}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1b9}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2e0}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xf}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4008040}, 0x4000000) 8.994087826s ago: executing program 0 (id=2736): r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x5451) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x0, 0x800000000004}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811000015202cabc1fabae625020fdb3d639ed6cb2f6c7e88a1ea5cb6b0961ab73ad97170ea41a6d3778d2b695fce9c5ba74d1e6688f1f3018dc5aa8d55983b171c2ae2561afbb96297dab21e90fe160a954f62051b8071f23ce9204b405d62bd78589b01d155bf7a093bf51b21b8", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x69) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000040)=0x13) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x80108906, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') close_range(r5, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000080)={0xfffd, 0x0, 0x0, 0x0, 0x0, "e318ff8c00368458"}) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000400)) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1a37c1, 0x122) openat$binfmt_register(0xffffff9c, &(0x7f0000005480), 0x1, 0x0) write$binfmt_register(r5, &(0x7f0000000240)={0x3a, 'syz3', 0x3a, 'E', 0x3a, 0x100000000, 0x3a, 'u\x04\x00\x00\x00W\b\xbd]Hy\x87\xe1\x1f\'\xba\'\xa7R\xc6P`\xe8\xbcb\x19\xfa\xb0\xce:^\x8eI^\\\xcc7\ryW@q&.\x81\xd7\x86-\x99p\x03e\xa1\x9bt\xda\x9e\xcc\xeb\xaeS\x9b\xb5\xc5R\x89\x0e\x00M\xfc\xf3bd\xbf?\xc9\x81M\xcf\xb8\xc7q\xc3t\xf5\xda\x8e\x87\b\xdc\xbe\"[\xa3\xeft\x0e\xa4\x18\x81\x94\x9d-q\xfa5|\xb9\x060x0, 0x10, 0x0, 0xd, 0x53f, {{0x1e, 0x4, 0x0, 0x1, 0x78, 0x67, 0x0, 0x1, 0x29, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp={0x44, 0x10, 0x42, 0x0, 0x8, [0x0, 0xb4, 0xffff]}, @generic={0x86, 0xf, "ce78500b17016afa3136534e12"}, @lsrr={0x83, 0x1b, 0xcf, [@remote, @multicast2, @local, @rand_addr=0x64010100, @remote, @remote]}, @timestamp={0x44, 0x28, 0x2d, 0x0, 0x7, [0x1, 0x50cdf198, 0x8, 0x5, 0x89, 0xfffffff7, 0x5, 0xfff, 0x4]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000280)={'syztnl0\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x8000, 0x20, 0x9, 0x7, {{0x15, 0x4, 0x2, 0x2, 0x54, 0x64, 0x0, 0xfc, 0xd1c1f60aa1a5ea86, 0x0, @dev={0xac, 0x14, 0x14, 0x17}, @private=0xa010101, {[@noop, @end, @rr={0x7, 0x17, 0x2a, [@remote, @loopback, @dev={0xac, 0x14, 0x14, 0x19}, @broadcast, @rand_addr=0x64010100]}, @timestamp={0x44, 0x8, 0xb9, 0x0, 0x1, [0x3]}, @rr={0x7, 0x1f, 0x6c, [@private=0xa010102, @remote, @multicast2, @dev={0xac, 0x14, 0x14, 0xa}, @remote, @local, @multicast1]}]}}}}}) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000300)=@add_del={0x2, &(0x7f00000002c0)='pimreg\x00'}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/asound/seq/clients\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000380)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000003c0)=0x14) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000400)={r3}, 0x8) ioctl$SNDCTL_DSP_NONBLOCK(r2, 0x500e, 0x0) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@private1, @in6=@private2}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000540)=0xe8) (async, rerun: 32) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (rerun: 32) r6 = add_key$user(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000600)="53e32e0aed2fa6920d9108307e3472e1ef64ebde6b045d10ae4262409b5ccc610821a6f68bf9e269c0e925e88e214610c1ab81f2494adc26ae3845537addf66d171ce5ad47ba9e253fc9e2ced82d3b5028ae1cca54460df9d255a343630d6a6f8311a185f6e1b7de91481e457ad9ac8c4b891fa67e95a1a2ba5e38ed86d178739c52b571070b683ce77c2cad93794e749d78d90822b0cc2ba8bde305dfa1de210f2c0e415ad44c08f66720feff873b83f8cc6f3afac7027b62b065b4abbb13e419f08702bbf9f9cb6fcf12787c48d5dd60812a1d9524332f03fbfb96c10001ceee50f88686515cf527313c0584ad13cd5d7f10af2a6d", 0xf6, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000700)={r6, 0xfe, 0x94}, &(0x7f0000000740)={'enc=', 'oaep', ' hash=', {'tgr160\x00'}}, &(0x7f00000007c0)="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", &(0x7f00000008c0)=""/148) r7 = add_key$keyring(&(0x7f0000000980), &(0x7f00000009c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) (async) r8 = add_key$keyring(&(0x7f0000000a00), &(0x7f0000000a40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r6, r7, r8, 0x0) (async) add_key(&(0x7f0000000a80)='asymmetric\x00', &(0x7f0000000ac0)={'syz', 0x1}, 0x0, 0x0, r8) (async) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000b00)={r8, 0x3d, 0xe8}, &(0x7f0000000b40)={'enc=', 'oaep', ' hash=', {'xcbc-aes-neon\x00'}}, &(0x7f0000000bc0)="07c33d37ddf3e1a9409078564be1c88a1c5bc98c6f0a3dd2aca0df37908555bba939056ec1799e9effb367df8c9f726c8ebf7be9026f2d899484976e46", &(0x7f0000000c00)=""/232) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000d00)={'batadv_slave_0\x00'}) (async, rerun: 32) syz_genetlink_get_family_id$l2tp(&(0x7f0000000d40), r4) (async, rerun: 32) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8983, &(0x7f0000000d80)={0x8, 'macvtap0\x00', {'hsr0\x00'}, 0x8e6}) (async, rerun: 32) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000dc0)=""/101, &(0x7f0000000e40)=0x65) (async, rerun: 32) r9 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000e80), 0xa2000) (rerun: 32) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r9, 0xc0105303, &(0x7f0000000ec0)={0x3, 0x0, 0x4}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) (async, rerun: 64) statx(0xffffffffffffff9c, &(0x7f0000000f80)='./file0\x00', 0x6000, 0x4, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (rerun: 64) setgroups(0x3, &(0x7f0000001180)=[r10, r11, 0x0]) 0s ago: executing program 0 (id=2738): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1, 0x1, {0x2, 0x1}}, 0x18) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x121442, 0x0) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "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", ['\x00', '\x00']}, 0xfa4) r4 = dup(r2) r5 = openat$vcsa(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) fstatfs(r5, &(0x7f0000002a40)=""/211) r6 = socket$inet(0x2, 0x2, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r7, &(0x7f00000000c0), 0x1c) syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="bbe36fe5d88f44816aaaaabb86dd6002adf700023a00fe880000000000000000000000000001ff020000000000000000000000000001"], 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r6, 0x5450, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) r9 = syz_open_dev$dri(&(0x7f0000000000), 0x2d1, 0x0) r10 = syz_open_dev$dri(&(0x7f0000000000), 0x2d1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r10, 0xc04064a0, &(0x7f00000001c0)={0x0, &(0x7f0000000080)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r9, 0xc06864a1, &(0x7f0000000280)={0x0, 0xfffffffffffffe6c, r11}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r4, 0xc04064a0, &(0x7f0000001380)={&(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x1, 0x6, 0x8}) ioctl$DRM_IOCTL_MODE_GETPLANE(r4, 0xc02064b6, &(0x7f0000001400)={r8, r11, r12, 0x0, 0x0, 0x1, &(0x7f00000013c0)=[0x0]}) ioctl$TIOCCBRK(r4, 0x5428) sendmsg$netlink(r0, &(0x7f0000003b80)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)={0x10, 0x26, 0x20, 0x70bd29, 0x25dfdbff}, 0x10}], 0x1, 0x0, 0x0, 0x4048000}, 0x4000000) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000500)=@newsa={0xf0, 0x10, 0x800, 0x70bd28, 0x25dfdbfd, {{@in=@dev={0xac, 0x14, 0x14, 0x14}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4e20, 0x3f, 0x4e21, 0x2, 0xa, 0x20, 0x80}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0x2b}, @in6=@mcast1, {0xfffffffffffffffd, 0x3, 0x7fffffff, 0x2, 0xffffffffffffffff, 0x518, 0x3a0c937e, 0x5}, {0x8, 0x9, 0x1ff, 0x405}, {0x51698c00, 0x5, 0x40}, 0x70bd24, 0x3506, 0x0, 0x2, 0x2, 0xa1}}, 0xf0}, 0x1, 0x0, 0x0, 0x42800}, 0x4c014) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x0, 0x70bd26, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x24000080}, 0x0) kernel console output (not intermixed with test programs): m="syz.0.2673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5404.139559][ T30] audit: type=1400 audit(6429.569:22330): avc: denied { create } for pid=11807 comm="syz.0.2673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5404.315216][ T30] audit: type=1400 audit(6429.739:22331): avc: denied { create } for pid=11807 comm="syz.0.2673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5404.470620][ T30] audit: type=1400 audit(6429.879:22332): avc: denied { ioctl } for pid=11807 comm="syz.0.2673" path="socket:[32093]" dev="sockfs" ino=32093 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5404.742600][ T30] audit: type=1400 audit(6430.159:22333): avc: denied { create } for pid=11808 comm="syz.1.2674" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5405.009650][ T30] audit: type=1400 audit(6430.419:22334): avc: denied { create } for pid=11808 comm="syz.1.2674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5405.170036][ T30] audit: type=1400 audit(6430.589:22335): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5405.448293][ T30] audit: type=1400 audit(6430.679:22336): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5406.686143][T11809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11809 comm=syz.0.2673 [ 5408.497527][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 5408.497644][ T30] audit: type=1400 audit(6433.919:22357): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5408.559015][ T30] audit: type=1400 audit(6433.989:22358): avc: denied { module_request } for pid=11808 comm="syz.1.2674" kmod="crypto-ctr(cast5)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5408.752024][ T30] audit: type=1400 audit(6434.179:22359): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5408.879150][ T30] audit: type=1400 audit(6434.229:22360): avc: denied { read write } for pid=11152 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5408.880105][ T30] audit: type=1400 audit(6434.259:22361): avc: denied { read write open } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5408.880892][ T30] audit: type=1400 audit(6434.299:22362): avc: denied { ioctl } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5409.037724][ T30] audit: type=1400 audit(6434.459:22363): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5409.134884][ T30] audit: type=1400 audit(6434.559:22364): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5409.272544][ T30] audit: type=1400 audit(6434.699:22365): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5409.383856][ T30] audit: type=1400 audit(6434.809:22366): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5413.618697][ T30] audit: type=1400 audit(6435.369:22367): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5413.619685][ T30] audit: type=1400 audit(6435.669:22368): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5413.620463][ T30] audit: type=1400 audit(6435.839:22369): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5413.621166][ T30] audit: type=1400 audit(6435.919:22370): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5413.621962][ T30] audit: type=1400 audit(6436.049:22371): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5413.622709][ T30] audit: type=1400 audit(6436.339:22372): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5413.623436][ T30] audit: type=1400 audit(6436.519:22373): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5413.624102][ T30] audit: type=1400 audit(6436.609:22374): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5413.624785][ T30] audit: type=1400 audit(6436.679:22375): avc: denied { create } for pid=11819 comm="syz.0.2675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5413.625440][ T30] audit: type=1400 audit(6436.689:22376): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5420.252295][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 5420.252515][ T30] audit: type=1400 audit(6442.819:22412): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5420.254680][ T30] audit: type=1400 audit(6443.279:22413): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5420.256052][ T30] audit: type=1400 audit(6443.559:22414): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5421.699234][ T30] audit: type=1400 audit(6443.639:22415): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5421.700188][ T30] audit: type=1400 audit(6443.719:22416): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5421.701245][ T30] audit: type=1400 audit(6443.839:22417): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5421.702211][ T30] audit: type=1400 audit(6443.989:22418): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5421.703008][ T30] audit: type=1400 audit(6444.049:22419): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5421.703712][ T30] audit: type=1400 audit(6444.169:22420): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5421.704528][ T30] audit: type=1400 audit(6445.789:22421): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5423.999550][T10067] usb 1-1: new high-speed USB device number 27 using dummy_hcd [ 5424.789143][T10067] usb 1-1: Using ep0 maxpacket: 32 [ 5425.444976][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 5425.445311][ T30] audit: type=1400 audit(6450.869:22462): avc: denied { ioctl } for pid=11821 comm="syz.0.2676" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5425.470732][ T30] audit: type=1400 audit(6450.849:22461): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5426.539633][ T30] audit: type=1400 audit(6451.729:22463): avc: denied { ioctl } for pid=11821 comm="syz.0.2676" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5426.541296][ T30] audit: type=1400 audit(6451.909:22464): avc: denied { ioctl } for pid=11821 comm="syz.0.2676" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5426.579175][ T30] audit: type=1400 audit(6452.009:22465): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5426.973391][ T30] audit: type=1400 audit(6452.399:22466): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5427.100931][ T30] audit: type=1400 audit(6452.489:22467): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5427.217976][ T30] audit: type=1400 audit(6452.639:22468): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5427.291306][ T30] audit: type=1400 audit(6452.719:22469): avc: denied { prog_load } for pid=11828 comm="syz.1.2677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5427.354680][ T30] audit: type=1400 audit(6452.779:22470): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5428.941443][T10067] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 5428.942146][T10067] usb 1-1: can't read configurations, error -71 [ 5430.816330][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 5430.816647][ T30] audit: type=1400 audit(6456.239:22497): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5430.969657][ T30] audit: type=1400 audit(6456.379:22498): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5431.087966][ T30] audit: type=1400 audit(6456.499:22499): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5432.628611][ T30] audit: type=1400 audit(6457.809:22500): avc: denied { read write } for pid=11152 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5432.630502][ T30] audit: type=1400 audit(6457.849:22501): avc: denied { read write open } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5432.631913][ T30] audit: type=1400 audit(6457.899:22502): avc: denied { ioctl } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5434.320060][ T30] audit: type=1400 audit(6459.059:22503): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5434.321971][ T30] audit: type=1400 audit(6459.159:22504): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5434.323763][ T30] audit: type=1400 audit(6459.199:22505): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5434.325012][ T30] audit: type=1400 audit(6459.259:22506): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5436.942934][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 5436.943130][ T30] audit: type=1400 audit(6462.369:22518): avc: denied { create } for pid=11835 comm="syz.0.2678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5437.289427][ T30] audit: type=1400 audit(6462.709:22519): avc: denied { bind } for pid=11835 comm="syz.0.2678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5437.555664][ T30] audit: type=1400 audit(6462.979:22520): avc: denied { accept } for pid=11835 comm="syz.0.2678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5437.911962][ T30] audit: type=1400 audit(6463.339:22521): avc: denied { write } for pid=11835 comm="syz.0.2678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5438.239427][ T30] audit: type=1400 audit(6463.639:22522): avc: denied { write } for pid=11835 comm="syz.0.2678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5438.593131][ T30] audit: type=1400 audit(6464.019:22523): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5438.883810][ T30] audit: type=1400 audit(6464.279:22524): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5439.002320][ T30] audit: type=1400 audit(6464.429:22525): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5439.113494][ T30] audit: type=1400 audit(6464.539:22526): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5439.208084][ T30] audit: type=1400 audit(6464.629:22527): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5442.038420][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 5442.038678][ T30] audit: type=1400 audit(6467.459:22553): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5442.270608][ T30] audit: type=1400 audit(6467.699:22554): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5442.541692][ T30] audit: type=1400 audit(6467.969:22555): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5443.328214][ T30] audit: type=1400 audit(6468.749:22556): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5443.879378][ T30] audit: type=1400 audit(6469.239:22557): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5444.045853][ T30] audit: type=1400 audit(6469.469:22558): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5444.307868][ T30] audit: type=1400 audit(6469.729:22559): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5444.427703][ T30] audit: type=1400 audit(6469.839:22560): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5444.595496][ T30] audit: type=1400 audit(6470.019:22561): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5444.995780][ T30] audit: type=1400 audit(6470.419:22562): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5447.309745][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 5447.310172][ T30] audit: type=1400 audit(6472.729:22577): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5447.442378][ T30] audit: type=1400 audit(6472.859:22578): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5447.632879][ T30] audit: type=1400 audit(6473.039:22579): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5447.741585][ T30] audit: type=1400 audit(6473.169:22580): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5447.808713][ T30] audit: type=1400 audit(6473.229:22581): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5447.928989][ T30] audit: type=1400 audit(6473.289:22582): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5447.993760][ T30] audit: type=1400 audit(6473.419:22583): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5448.038076][ T30] audit: type=1400 audit(6473.459:22584): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5448.145356][ T30] audit: type=1400 audit(6473.569:22585): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5448.548244][ T30] audit: type=1400 audit(6473.729:22586): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5452.847960][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 5452.848193][ T30] audit: type=1400 audit(6478.269:22598): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5452.900880][ T30] audit: type=1400 audit(6478.299:22599): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5453.072336][ T30] audit: type=1400 audit(6478.499:22600): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5453.192542][ T30] audit: type=1400 audit(6478.619:22601): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5453.401961][ T30] audit: type=1400 audit(6478.829:22602): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5453.510301][ T30] audit: type=1400 audit(6478.929:22603): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5453.618266][ T30] audit: type=1400 audit(6479.029:22604): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5453.737989][ T30] audit: type=1400 audit(6479.159:22605): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5453.982975][ T30] audit: type=1400 audit(6479.409:22606): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5454.218351][ T30] audit: type=1400 audit(6479.619:22607): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5458.491445][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 5458.491662][ T30] audit: type=1400 audit(6483.849:22624): avc: denied { create } for pid=11847 comm="syz.1.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5458.951008][ T30] audit: type=1400 audit(6484.379:22625): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5459.098432][ T30] audit: type=1400 audit(6484.519:22626): avc: denied { create } for pid=11847 comm="syz.1.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5459.367789][ T30] audit: type=1400 audit(6484.779:22627): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5459.480197][ T30] audit: type=1400 audit(6484.909:22628): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5459.618414][ T30] audit: type=1400 audit(6485.009:22629): avc: denied { write } for pid=11847 comm="syz.1.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5459.630114][ T30] audit: type=1400 audit(6485.059:22630): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5459.718780][ T30] audit: type=1400 audit(6485.139:22631): avc: denied { create } for pid=11849 comm="syz.0.2683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5459.797945][ T30] audit: type=1400 audit(6485.209:22632): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5459.799733][ T30] audit: type=1400 audit(6485.219:22633): avc: denied { write } for pid=11849 comm="syz.0.2683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5463.565979][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 5463.566086][ T30] audit: type=1400 audit(6488.989:22660): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5464.378866][ T30] audit: type=1400 audit(6489.529:22661): avc: denied { create } for pid=11851 comm="syz.0.2684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5464.379839][ T30] audit: type=1400 audit(6489.589:22662): avc: denied { bind } for pid=11851 comm="syz.0.2684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5464.380619][ T30] audit: type=1400 audit(6489.659:22663): avc: denied { accept } for pid=11851 comm="syz.0.2684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5464.381410][ T30] audit: type=1400 audit(6489.689:22664): avc: denied { write } for pid=11851 comm="syz.0.2684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5464.717584][ T30] audit: type=1400 audit(6489.909:22665): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5464.718636][ T30] audit: type=1400 audit(6490.129:22666): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5464.719561][ T30] audit: type=1400 audit(6490.139:22667): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5464.848443][ T30] audit: type=1400 audit(6490.169:22668): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5464.849442][ T30] audit: type=1400 audit(6490.219:22669): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5468.805020][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 5468.805157][ T30] audit: type=1400 audit(6494.229:22699): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5468.941695][ T30] audit: type=1400 audit(6494.369:22700): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5469.025035][ T30] audit: type=1400 audit(6494.439:22701): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5469.058336][ T30] audit: type=1400 audit(6494.479:22702): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5469.158415][ T30] audit: type=1400 audit(6494.579:22703): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5470.069234][ T30] audit: type=1400 audit(6495.469:22704): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5470.103135][ T30] audit: type=1400 audit(6495.529:22705): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5470.155586][ T30] audit: type=1400 audit(6495.579:22706): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5470.366647][ T30] audit: type=1400 audit(6495.789:22707): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5470.559840][ T30] audit: type=1400 audit(6495.989:22708): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5474.298182][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 5474.298300][ T30] audit: type=1400 audit(6499.719:22731): avc: denied { read } for pid=11858 comm="syz.1.2687" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5474.573272][ T30] audit: type=1400 audit(6499.999:22732): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5474.767686][ T30] audit: type=1400 audit(6500.179:22733): avc: denied { read open } for pid=11858 comm="syz.1.2687" path="net:[4026532688]" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5474.801790][ T30] audit: type=1400 audit(6500.219:22734): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5474.942912][ T30] audit: type=1400 audit(6500.359:22735): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5475.109143][ T30] audit: type=1400 audit(6500.529:22736): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5475.418923][ T30] audit: type=1400 audit(6500.839:22737): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5477.475025][ T30] audit: type=1400 audit(6501.209:22738): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5477.478691][ T30] audit: type=1400 audit(6501.299:22739): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5477.479921][ T30] audit: type=1400 audit(6501.349:22740): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5479.340313][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 5479.340427][ T30] audit: type=1400 audit(6504.769:22769): avc: denied { read } for pid=11858 comm="syz.1.2687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5479.381448][T11867] block device autoloading is deprecated and will be removed. [ 5479.578554][ T30] audit: type=1400 audit(6504.999:22770): avc: denied { read } for pid=11858 comm="syz.1.2687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5479.810015][ T30] audit: type=1400 audit(6505.209:22771): avc: denied { write } for pid=11858 comm="syz.1.2687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5480.315404][ T30] audit: type=1400 audit(6505.739:22772): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5480.519175][ T30] audit: type=1400 audit(6505.939:22773): avc: denied { read write } for pid=11858 comm="syz.1.2687" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 5480.732881][ T30] audit: type=1400 audit(6506.159:22774): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5480.789316][ T30] audit: type=1400 audit(6506.209:22776): avc: denied { read write open } for pid=11858 comm="syz.1.2687" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 5480.799561][ T30] audit: type=1400 audit(6506.179:22775): avc: denied { write } for pid=11858 comm="syz.1.2687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5480.958147][ T30] audit: type=1400 audit(6506.359:22777): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5481.188374][ T30] audit: type=1400 audit(6506.609:22778): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5484.748247][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 5484.748477][ T30] audit: type=1400 audit(6509.909:22794): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5484.750678][ T30] audit: type=1400 audit(6509.949:22795): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5484.752148][ T30] audit: type=1400 audit(6509.999:22796): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5485.470187][ T30] audit: type=1400 audit(6510.849:22797): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5485.792973][ T30] audit: type=1400 audit(6511.219:22798): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5485.936549][ T30] audit: type=1400 audit(6511.359:22799): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5486.116600][ T30] audit: type=1400 audit(6511.539:22800): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5486.298017][ T30] audit: type=1400 audit(6511.709:22801): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5486.574157][ T30] audit: type=1400 audit(6511.979:22802): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5486.778678][ T30] audit: type=1400 audit(6512.199:22803): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5489.858410][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 5489.858615][ T30] audit: type=1400 audit(6515.279:22816): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5490.440063][ T30] audit: type=1400 audit(6515.849:22817): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5490.844847][ T30] audit: type=1400 audit(6516.269:22818): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5491.094131][ T30] audit: type=1400 audit(6516.509:22819): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5491.343422][ T30] audit: type=1400 audit(6516.759:22820): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5491.568015][ T30] audit: type=1400 audit(6516.969:22821): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5491.851566][ T30] audit: type=1400 audit(6517.279:22822): avc: denied { read append } for pid=11870 comm="syz.1.2689" name="dlm-control" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5491.859970][ T30] audit: type=1400 audit(6517.289:22823): avc: denied { create } for pid=11871 comm="syz.0.2688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5491.862701][ T30] audit: type=1400 audit(6517.289:22824): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5491.912172][ T30] audit: type=1400 audit(6517.339:22825): avc: denied { read append open } for pid=11870 comm="syz.1.2689" path="/dev/dlm-control" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5492.009372][T11873] dlm: no local IP address has been set [ 5492.010777][T11873] dlm: cannot start dlm midcomms -107 [ 5494.928644][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 5494.928869][ T30] audit: type=1400 audit(6520.349:22845): avc: denied { module_request } for pid=11870 comm="syz.1.2689" kmod="net-pf-2-proto-9-type-4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5494.990883][ T30] audit: type=1400 audit(6520.409:22846): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5495.247961][ T30] audit: type=1400 audit(6520.649:22847): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5495.689228][ T30] audit: type=1400 audit(6521.119:22848): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5495.958212][ T30] audit: type=1400 audit(6521.319:22849): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5495.997513][ T30] audit: type=1400 audit(6521.419:22850): avc: denied { module_request } for pid=11870 comm="syz.1.2689" kmod="net-pf-2-proto-9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5496.079203][ T30] audit: type=1400 audit(6521.489:22851): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5496.153968][ T30] audit: type=1400 audit(6521.579:22852): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5496.267841][ T30] audit: type=1400 audit(6521.689:22853): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5496.579217][ T30] audit: type=1400 audit(6521.979:22854): avc: denied { map_create } for pid=11877 comm="syz.0.2690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5500.223475][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 5500.223672][ T30] audit: type=1400 audit(6525.649:22887): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5500.892308][ T30] audit: type=1400 audit(6526.319:22888): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5501.250321][ T30] audit: type=1400 audit(6526.669:22889): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5501.519396][ T30] audit: type=1400 audit(6526.889:22890): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5501.970250][ T30] audit: type=1400 audit(6527.179:22891): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5502.513029][ T30] audit: type=1400 audit(6527.939:22892): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5502.800058][ T30] audit: type=1400 audit(6528.229:22893): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5502.965197][ T30] audit: type=1400 audit(6528.389:22894): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5503.003595][ T30] audit: type=1400 audit(6528.429:22895): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5503.110903][ T30] audit: type=1400 audit(6528.539:22896): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5505.248824][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 5505.249076][ T30] audit: type=1400 audit(6530.669:22910): avc: denied { setopt } for pid=11883 comm="syz.1.2691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5505.288446][ T30] audit: type=1400 audit(6530.709:22911): avc: denied { connect } for pid=11883 comm="syz.1.2691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5505.319620][ T30] audit: type=1400 audit(6530.739:22912): avc: denied { write } for pid=11883 comm="syz.1.2691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5505.321243][ T30] audit: type=1400 audit(6530.739:22913): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5505.358606][ T30] audit: type=1400 audit(6530.769:22914): avc: denied { write } for pid=11883 comm="syz.1.2691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5505.378308][ T30] audit: type=1400 audit(6530.789:22915): avc: denied { write } for pid=11883 comm="syz.1.2691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5505.429932][ T30] audit: type=1400 audit(6530.839:22916): avc: denied { read append } for pid=11883 comm="syz.1.2691" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 5505.449891][ T30] audit: type=1400 audit(6530.869:22917): avc: denied { read open } for pid=11883 comm="syz.1.2691" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 5505.588656][ T30] audit: type=1400 audit(6530.939:22918): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5505.849597][ T30] audit: type=1400 audit(6531.269:22919): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5510.778510][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 5510.778704][ T30] audit: type=1400 audit(6536.199:22944): avc: denied { open } for pid=11885 comm="syz.0.2692" path="/dev/ptyq4" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 5511.054769][ T30] audit: type=1400 audit(6536.479:22945): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5511.113737][ T30] audit: type=1400 audit(6536.539:22946): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5511.144866][ T30] audit: type=1400 audit(6536.569:22947): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5511.175417][ T30] audit: type=1400 audit(6536.599:22948): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5511.224817][ T30] audit: type=1400 audit(6536.649:22949): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5513.183745][ T30] audit: type=1400 audit(6537.559:22950): avc: denied { read write } for pid=11152 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5513.184936][ T30] audit: type=1400 audit(6537.599:22951): avc: denied { read write open } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5513.185945][ T30] audit: type=1400 audit(6537.639:22952): avc: denied { mount } for pid=11888 comm="syz.1.2694" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 5513.199401][ T30] audit: type=1400 audit(6537.639:22953): avc: denied { ioctl } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5517.474650][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 5517.475113][ T30] audit: type=1400 audit(6542.899:22968): avc: denied { create } for pid=11893 comm="syz.0.2693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5517.623036][ T30] audit: type=1400 audit(6543.049:22969): avc: denied { write } for pid=11893 comm="syz.0.2693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5517.663418][ T30] audit: type=1400 audit(6543.089:22970): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5517.807521][ T30] audit: type=1400 audit(6543.229:22971): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5517.890901][ T30] audit: type=1400 audit(6543.319:22972): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5518.023403][ T30] audit: type=1400 audit(6543.449:22973): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5518.132033][ T30] audit: type=1400 audit(6543.559:22974): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5518.253690][ T30] audit: type=1400 audit(6543.659:22975): avc: denied { read } for pid=11893 comm="syz.0.2693" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5518.404522][ T30] audit: type=1400 audit(6543.829:22976): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5518.554979][ T30] audit: type=1400 audit(6543.979:22977): avc: denied { read open } for pid=11893 comm="syz.0.2693" path="net:[4026532631]" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5522.877878][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 5522.878110][ T30] audit: type=1400 audit(6548.229:23001): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5523.058618][ T30] audit: type=1400 audit(6548.479:23002): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5523.313211][ T30] audit: type=1400 audit(6548.729:23003): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5523.394919][ T30] audit: type=1400 audit(6548.819:23004): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5523.651785][ T30] audit: type=1400 audit(6549.079:23005): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5523.818384][ T30] audit: type=1400 audit(6549.219:23006): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5523.987746][ T30] audit: type=1400 audit(6549.409:23007): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5524.187635][ T30] audit: type=1400 audit(6549.589:23008): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5524.732214][ T30] audit: type=1400 audit(6549.949:23009): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5524.733073][ T30] audit: type=1400 audit(6550.159:23010): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5529.108231][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 5529.108462][ T30] audit: type=1400 audit(6552.229:23025): avc: denied { read write open } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5529.110004][ T30] audit: type=1400 audit(6552.259:23026): avc: denied { ioctl } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5529.110796][ T30] audit: type=1400 audit(6553.389:23027): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5529.112011][ T30] audit: type=1400 audit(6553.419:23028): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5529.113028][ T30] audit: type=1400 audit(6553.449:23029): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5529.710910][ T30] audit: type=1400 audit(6555.139:23030): avc: denied { read write } for pid=11152 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5529.754655][ T30] audit: type=1400 audit(6555.179:23031): avc: denied { read write open } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5529.939392][ T30] audit: type=1400 audit(6555.219:23032): avc: denied { ioctl } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5530.467439][ T30] audit: type=1400 audit(6555.469:23033): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5530.468402][ T30] audit: type=1400 audit(6555.779:23034): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5535.609612][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 5535.609880][ T30] audit: type=1400 audit(6558.929:23066): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5535.612133][ T30] audit: type=1400 audit(6558.969:23067): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5535.613632][ T30] audit: type=1400 audit(6560.829:23068): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5535.615128][ T30] audit: type=1400 audit(6560.869:23069): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5535.616662][ T30] audit: type=1400 audit(6560.939:23070): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5536.079522][ T30] audit: type=1400 audit(6561.469:23071): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5536.228618][ T30] audit: type=1400 audit(6561.649:23072): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5536.338763][ T30] audit: type=1400 audit(6561.739:23073): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5536.340558][ T30] audit: type=1400 audit(6561.759:23074): avc: denied { read write } for pid=11152 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5536.403190][ T30] audit: type=1400 audit(6561.829:23075): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5540.719395][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 5540.719644][ T30] audit: type=1400 audit(6566.099:23105): avc: denied { create } for pid=11910 comm="syz.0.2700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5540.742717][ T30] audit: type=1400 audit(6566.159:23106): avc: denied { create } for pid=11910 comm="syz.0.2700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5540.923149][ T30] audit: type=1400 audit(6566.249:23107): avc: denied { ioctl } for pid=11910 comm="syz.0.2700" path="socket:[31612]" dev="sockfs" ino=31612 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5540.924840][ T30] audit: type=1400 audit(6566.309:23108): avc: denied { ioctl } for pid=11910 comm="syz.0.2700" path="socket:[31613]" dev="sockfs" ino=31613 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5542.259457][ T30] audit: type=1400 audit(6566.799:23109): avc: denied { compute_member } for pid=11911 comm="syz.1.2702" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 5542.261276][ T30] audit: type=1400 audit(6567.429:23110): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5542.262927][ T30] audit: type=1400 audit(6567.469:23111): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5542.264444][ T30] audit: type=1400 audit(6567.519:23112): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5542.266060][ T30] audit: type=1400 audit(6567.639:23113): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5544.515213][ T30] audit: type=1400 audit(6567.919:23114): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5545.808201][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 5545.808312][ T30] audit: type=1400 audit(6571.229:23139): avc: denied { setopt } for pid=11918 comm="syz.1.2705" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5545.809506][ T30] audit: type=1400 audit(6571.229:23140): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5546.016437][ T30] audit: type=1400 audit(6571.439:23141): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5546.216196][ T30] audit: type=1400 audit(6571.639:23142): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5546.355848][ T30] audit: type=1400 audit(6571.779:23143): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5546.850967][ T30] audit: type=1400 audit(6572.279:23144): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5547.048655][ T30] audit: type=1400 audit(6572.389:23145): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5547.049573][ T30] audit: type=1400 audit(6572.429:23146): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5547.050542][ T30] audit: type=1400 audit(6572.459:23147): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5547.051391][ T30] audit: type=1400 audit(6572.469:23148): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5550.848026][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 5550.848250][ T30] audit: type=1400 audit(6576.269:23170): avc: denied { ioctl } for pid=11922 comm="syz.1.2708" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5550.872349][T11923] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5550.874426][T11923] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5550.878301][ T30] audit: type=1400 audit(6576.289:23171): avc: denied { ioctl } for pid=11922 comm="syz.1.2708" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5552.058456][ T30] audit: type=1400 audit(6576.839:23172): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5552.059872][ T30] audit: type=1400 audit(6576.879:23173): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5552.060952][ T30] audit: type=1400 audit(6576.919:23174): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5554.484655][ T30] audit: type=1400 audit(6579.909:23175): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5555.227905][ T30] audit: type=1400 audit(6580.159:23176): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5555.228966][ T30] audit: type=1400 audit(6580.189:23177): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5555.229689][ T30] audit: type=1400 audit(6580.219:23178): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5555.230765][ T30] audit: type=1400 audit(6580.319:23179): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5555.939640][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 5555.939738][ T30] audit: type=1400 audit(6581.359:23189): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5556.063291][ T30] audit: type=1400 audit(6581.489:23190): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5556.208155][ T30] audit: type=1400 audit(6581.579:23191): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5557.340342][ T30] audit: type=1400 audit(6582.679:23192): avc: denied { create } for pid=11930 comm="syz.0.2710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5557.342207][ T30] audit: type=1400 audit(6582.709:23193): avc: denied { create } for pid=11930 comm="syz.0.2710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5557.343620][ T30] audit: type=1400 audit(6582.729:23194): avc: denied { write } for pid=11930 comm="syz.0.2710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5557.344915][ T30] audit: type=1400 audit(6582.759:23195): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5557.346336][ T30] audit: type=1400 audit(6582.759:23196): avc: denied { read } for pid=11930 comm="syz.0.2710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5557.378682][ T30] audit: type=1400 audit(6582.799:23197): avc: denied { read } for pid=11930 comm="syz.0.2710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5557.428302][ T30] audit: type=1400 audit(6582.829:23198): avc: denied { ioctl } for pid=11930 comm="syz.0.2710" path="socket:[32282]" dev="sockfs" ino=32282 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5561.038056][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 5561.038218][ T30] audit: type=1400 audit(6586.459:23217): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5561.481002][ T30] audit: type=1400 audit(6586.909:23218): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5561.631902][ T30] audit: type=1400 audit(6587.059:23219): avc: denied { bpf } for pid=11932 comm="syz.0.2711" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5561.668079][ T30] audit: type=1400 audit(6587.089:23220): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5561.814638][ T30] audit: type=1400 audit(6587.239:23221): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5563.878547][ T30] audit: type=1400 audit(6587.459:23222): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5563.879549][ T30] audit: type=1400 audit(6587.549:23223): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5563.880296][ T30] audit: type=1400 audit(6587.629:23224): avc: denied { search } for pid=11928 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5563.881067][ T30] audit: type=1400 audit(6587.659:23225): avc: denied { search } for pid=11928 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=462 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5563.881897][ T30] audit: type=1400 audit(6587.679:23226): avc: denied { search } for pid=11928 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=603 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5567.351159][T11934] audit_log_start: 38 callbacks suppressed [ 5567.351282][T11934] audit: audit_backlog=65 > audit_backlog_limit=64 [ 5567.351443][ T30] audit: type=1400 audit(6589.329:23265): avc: denied { search } for pid=11934 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5567.351930][ T30] audit: type=1400 audit(6589.359:23266): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5567.352471][T11934] audit: audit_lost=81 audit_rate_limit=0 audit_backlog_limit=64 [ 5567.353523][ T30] audit: type=1400 audit(6589.379:23267): avc: denied { search } for pid=11934 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=462 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5567.354094][T11934] audit: backlog limit exceeded [ 5567.354920][ T30] audit: type=1400 audit(6589.429:23268): avc: denied { search } for pid=11934 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=603 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5567.356172][ T30] audit: type=1400 audit(6589.469:23269): avc: denied { read } for pid=11934 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=604 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5567.378329][ T30] audit: type=1400 audit(6589.519:23270): avc: denied { read open } for pid=11934 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=604 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5567.379203][ T30] audit: type=1400 audit(6589.569:23271): avc: denied { getattr } for pid=11934 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=604 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5572.887985][ T30] kauditd_printk_skb: 115 callbacks suppressed [ 5572.888101][ T30] audit: type=1400 audit(6597.739:23387): avc: denied { search } for pid=11928 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5572.890148][ T30] audit: type=1400 audit(6597.789:23388): avc: denied { getattr } for pid=11928 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5572.891247][ T30] audit: type=1400 audit(6597.949:23389): avc: denied { search } for pid=11928 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5572.892178][ T30] audit: type=1400 audit(6597.999:23390): avc: denied { getattr } for pid=11928 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5572.893101][ T30] audit: type=1400 audit(6598.149:23391): avc: denied { search } for pid=11928 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5572.893949][ T30] audit: type=1400 audit(6598.189:23392): avc: denied { search } for pid=11928 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=462 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5572.894724][ T30] audit: type=1400 audit(6598.239:23393): avc: denied { search } for pid=11928 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=603 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5572.895574][ T30] audit: type=1400 audit(6598.289:23394): avc: denied { getattr } for pid=11928 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=3572 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5574.178557][ T30] audit: type=1400 audit(6598.809:23395): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5574.179582][ T30] audit: type=1400 audit(6598.869:23396): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5578.612576][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 5578.612712][ T30] audit: type=1400 audit(6602.959:23426): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5578.614031][ T30] audit: type=1400 audit(6603.069:23427): avc: denied { read write } for pid=11152 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5579.228933][ T30] audit: type=1400 audit(6603.119:23428): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5579.229902][ T30] audit: type=1400 audit(6603.129:23429): avc: denied { read write open } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5579.230795][ T30] audit: type=1400 audit(6603.159:23430): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5579.231646][ T30] audit: type=1400 audit(6603.169:23431): avc: denied { ioctl } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5579.232586][ T30] audit: type=1400 audit(6603.219:23432): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5579.233424][ T30] audit: type=1400 audit(6603.259:23433): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5579.234271][ T30] audit: type=1400 audit(6603.439:23434): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5579.235072][ T30] audit: type=1400 audit(6603.609:23435): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5589.760179][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 5589.760306][ T30] audit: type=1400 audit(6607.359:23465): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5589.761345][ T30] audit: type=1400 audit(6607.559:23466): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5589.762026][ T30] audit: type=1400 audit(6607.649:23467): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5589.762682][ T30] audit: type=1400 audit(6607.729:23468): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5589.763352][ T30] audit: type=1400 audit(6607.829:23469): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5589.764008][ T30] audit: type=1400 audit(6608.069:23470): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5589.764658][ T30] audit: type=1400 audit(6608.229:23471): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5589.765326][ T30] audit: type=1400 audit(6608.329:23472): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5589.766046][ T30] audit: type=1400 audit(6608.429:23473): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5589.767533][ T30] audit: type=1400 audit(6608.529:23474): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5595.945615][T11954] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11954 comm=syz.0.2718 [ 5596.064224][ T30] kauditd_printk_skb: 58 callbacks suppressed [ 5596.064327][ T30] audit: type=1400 audit(6621.489:23533): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5600.490422][ T30] audit: type=1400 audit(6621.609:23534): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5600.492382][ T30] audit: type=1400 audit(6621.619:23535): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5600.493940][ T30] audit: type=1400 audit(6621.799:23536): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5600.495628][ T30] audit: type=1400 audit(6621.869:23537): avc: denied { read write } for pid=11152 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5600.507987][ T30] audit: type=1400 audit(6621.889:23538): avc: denied { read write open } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5600.509063][ T30] audit: type=1400 audit(6621.909:23539): avc: denied { ioctl } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5600.510024][ T30] audit: type=1400 audit(6622.999:23540): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5600.511012][ T30] audit: type=1400 audit(6623.029:23541): avc: denied { create } for pid=11955 comm="syz.0.2720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5600.511818][ T30] audit: type=1400 audit(6623.059:23542): avc: denied { write } for pid=11955 comm="syz.0.2720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5601.700915][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 5601.701166][ T30] audit: type=1400 audit(6625.969:23562): avc: denied { perfmon } for pid=11958 comm="syz.0.2721" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5601.703466][ T30] audit: type=1400 audit(6626.009:23563): avc: denied { bpf } for pid=11958 comm="syz.0.2721" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5601.704900][ T30] audit: type=1400 audit(6626.559:23564): avc: denied { read write } for pid=11152 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5601.706484][ T30] audit: type=1400 audit(6626.579:23565): avc: denied { read write open } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5601.711625][ T30] audit: type=1400 audit(6626.619:23566): avc: denied { ioctl } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5601.713279][ T30] audit: type=1400 audit(6627.039:23567): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5601.818432][ T30] audit: type=1400 audit(6627.199:23568): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5601.893090][ T30] audit: type=1400 audit(6627.319:23569): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5602.088855][ T30] audit: type=1400 audit(6627.479:23570): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5602.914220][ T30] audit: type=1400 audit(6628.339:23571): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5608.589396][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 5608.589505][ T30] audit: type=1400 audit(6634.019:23585): avc: denied { read } for pid=11967 comm="syz.1.2724" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5608.713184][ T30] audit: type=1400 audit(6634.139:23586): avc: denied { read open } for pid=11967 comm="syz.1.2724" path="net:[4026532688]" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5608.828686][ T30] audit: type=1400 audit(6634.249:23587): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5609.011601][ T30] audit: type=1400 audit(6634.439:23588): avc: denied { create } for pid=11967 comm="syz.1.2724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5609.050162][ T30] audit: type=1400 audit(6634.479:23589): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5609.153156][ T30] audit: type=1400 audit(6634.579:23590): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5609.329206][ T30] audit: type=1400 audit(6634.739:23591): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5609.547735][ T30] audit: type=1400 audit(6634.969:23592): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5612.299805][ T30] audit: type=1400 audit(6636.039:23593): avc: denied { read write } for pid=11152 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5612.301044][ T30] audit: type=1400 audit(6636.079:23594): avc: denied { read write open } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5615.050085][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 5615.050266][ T30] audit: type=1400 audit(6637.849:23602): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5615.052111][ T30] audit: type=1400 audit(6637.939:23603): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5615.053358][ T30] audit: type=1400 audit(6638.019:23604): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5615.054738][ T30] audit: type=1400 audit(6638.069:23605): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5615.056043][ T30] audit: type=1400 audit(6638.209:23606): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5615.059377][ T30] audit: type=1400 audit(6638.319:23607): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5615.060728][ T30] audit: type=1400 audit(6638.379:23608): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5615.062146][ T30] audit: type=1400 audit(6638.489:23609): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5615.063484][ T30] audit: type=1400 audit(6638.589:23610): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5615.064784][ T30] audit: type=1400 audit(6639.939:23611): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5621.698382][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 5621.698503][ T30] audit: type=1400 audit(6645.459:23628): avc: denied { create } for pid=11975 comm="syz.1.2726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5621.700745][ T30] audit: type=1400 audit(6645.529:23629): avc: denied { getopt } for pid=11975 comm="syz.1.2726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5621.701912][ T30] audit: type=1400 audit(6646.389:23630): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5621.702758][ T30] audit: type=1400 audit(6646.489:23631): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5621.703627][ T30] audit: type=1400 audit(6646.509:23632): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5621.704542][ T30] audit: type=1400 audit(6646.539:23633): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5621.705392][ T30] audit: type=1400 audit(6646.559:23634): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5621.719442][ T30] audit: type=1400 audit(6646.589:23635): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5621.720886][ T30] audit: type=1400 audit(6646.649:23636): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5621.722173][ T30] audit: type=1400 audit(6646.699:23637): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5626.718769][ T30] kauditd_printk_skb: 33 callbacks suppressed [ 5626.718903][ T30] audit: type=1400 audit(6652.139:23671): avc: denied { create } for pid=11981 comm="syz.1.2729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5626.962574][T11982] FAULT_INJECTION: forcing a failure. [ 5626.962574][T11982] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 5626.963710][T11982] CPU: 0 UID: 0 PID: 11982 Comm: syz.1.2729 Not tainted 6.12.0-syzkaller-07749-g28eb75e178d3 #0 [ 5626.964472][T11982] Hardware name: linux,dummy-virt (DT) [ 5626.965001][T11982] Call trace: [ 5626.965468][T11982] show_stack+0x18/0x24 (C) [ 5626.966085][T11982] dump_stack_lvl+0xdc/0xf4 [ 5626.966628][T11982] dump_stack+0x1c/0x28 [ 5626.967150][T11982] should_fail_ex+0x510/0x5f4 [ 5626.967701][T11982] should_fail_alloc_page+0x70/0xb8 [ 5626.968336][T11982] prepare_alloc_pages+0x170/0x518 [ 5626.968882][T11982] __alloc_pages_noprof+0x140/0x224c [ 5626.969394][T11982] alloc_pages_mpol_noprof+0x104/0x490 [ 5626.969966][T11982] alloc_pages_noprof+0x178/0x1ec [ 5626.970493][T11982] __pte_alloc_one_noprof.constprop.0+0x20/0x26c [ 5626.971058][T11982] __pte_alloc+0x78/0x288 [ 5626.971531][T11982] __handle_mm_fault+0x2ac4/0x3698 [ 5626.972023][T11982] handle_mm_fault+0x330/0x79c [ 5626.972530][T11982] do_page_fault+0x2e4/0xeac [ 5626.973059][T11982] do_translation_fault+0x184/0x1e8 [ 5626.973558][T11982] do_mem_abort+0x68/0x1a4 [ 5626.974081][T11982] el1_abort+0x3c/0x5c [ 5626.974561][T11982] el1h_64_sync_handler+0xa8/0x124 [ 5626.975088][T11982] el1h_64_sync+0x6c/0x70 [ 5626.975739][T11982] do_vfs_ioctl+0xfe0/0x1c9c (P) [ 5626.976365][T11982] do_vfs_ioctl+0xf90/0x1c9c (L) [ 5626.977167][T11982] __arm64_sys_ioctl+0xd4/0x18c [ 5626.977876][T11982] invoke_syscall+0x6c/0x258 [ 5626.978499][T11982] el0_svc_common.constprop.0+0xac/0x230 [ 5626.979027][T11982] do_el0_svc+0x40/0x58 [ 5626.979495][T11982] el0_svc+0x50/0x180 [ 5626.980026][T11982] el0t_64_sync_handler+0x10c/0x138 [ 5626.980566][T11982] el0t_64_sync+0x198/0x19c [ 5627.198059][ T30] audit: type=1400 audit(6652.589:23672): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5627.622558][ T30] audit: type=1400 audit(6653.049:23673): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5627.669663][ T30] audit: type=1400 audit(6653.089:23674): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5627.789769][ T30] audit: type=1400 audit(6653.139:23675): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5628.162904][ T30] audit: type=1400 audit(6653.589:23676): avc: denied { read write } for pid=11152 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5628.383002][ T30] audit: type=1400 audit(6653.809:23677): avc: denied { read write open } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5628.412810][ T30] audit: type=1400 audit(6653.839:23678): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5628.551886][ T30] audit: type=1400 audit(6653.979:23679): avc: denied { ioctl } for pid=11152 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5628.729947][ T30] audit: type=1400 audit(6654.149:23680): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5631.878160][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 5631.878370][ T30] audit: type=1400 audit(6657.299:23699): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5632.032149][ T30] audit: type=1400 audit(6657.449:23700): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5632.439055][ T30] audit: type=1400 audit(6657.839:23701): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5632.612544][ T30] audit: type=1400 audit(6658.039:23702): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5632.654350][ T30] audit: type=1400 audit(6658.079:23703): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5632.697102][ T30] audit: type=1400 audit(6658.119:23704): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5632.744886][ T30] audit: type=1400 audit(6658.169:23705): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5632.868672][ T30] audit: type=1400 audit(6658.289:23706): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5632.968435][ T30] audit: type=1400 audit(6658.379:23707): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5632.993597][ T30] audit: type=1400 audit(6658.419:23708): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5636.978683][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 5636.978917][ T30] audit: type=1400 audit(6662.369:23726): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5637.059727][ T30] audit: type=1400 audit(6662.469:23727): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5637.069622][ T30] audit: type=1400 audit(6662.499:23728): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5637.099213][ T30] audit: type=1400 audit(6662.509:23729): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5637.149662][ T30] audit: type=1400 audit(6662.539:23730): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5637.155750][ T30] audit: type=1400 audit(6662.579:23731): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5637.193960][ T30] audit: type=1400 audit(6662.619:23732): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5637.255455][ T30] audit: type=1400 audit(6662.679:23733): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5638.705036][ T30] audit: type=1400 audit(6663.759:23734): avc: denied { create } for pid=11988 comm="syz.0.2728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5638.707671][ T30] audit: type=1400 audit(6663.849:23735): avc: denied { write } for pid=11988 comm="syz.0.2728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5641.991688][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 5641.991966][ T30] audit: type=1400 audit(6667.419:23764): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5642.198340][ T30] audit: type=1400 audit(6667.609:23765): avc: denied { sys_module } for pid=11988 comm="syz.0.2728" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5642.418695][ T30] audit: type=1400 audit(6667.839:23766): avc: denied { module_request } for pid=11988 comm="syz.0.2728" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5642.617637][ T30] audit: type=1400 audit(6668.029:23767): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5642.978418][ T30] audit: type=1400 audit(6668.389:23768): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5643.018395][ T30] audit: type=1400 audit(6668.429:23769): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5643.219975][ T30] audit: type=1400 audit(6668.489:23770): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5643.221868][ T30] audit: type=1400 audit(6668.569:23771): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5643.348289][ T30] audit: type=1400 audit(6668.769:23772): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5643.468223][ T30] audit: type=1400 audit(6668.879:23773): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5647.218643][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 5647.218777][ T30] audit: type=1400 audit(6672.429:23791): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5647.220118][ T30] audit: type=1400 audit(6672.509:23792): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5647.444491][ T30] audit: type=1400 audit(6672.869:23793): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5647.743976][ T30] audit: type=1400 audit(6673.169:23794): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5647.976405][ T30] audit: type=1400 audit(6673.399:23795): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5648.569236][ T30] audit: type=1400 audit(6673.739:23796): avc: denied { prog_load } for pid=12001 comm="syz.0.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5648.571043][ T30] audit: type=1400 audit(6673.769:23797): avc: denied { bpf } for pid=12001 comm="syz.0.2733" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5648.572496][ T30] audit: type=1400 audit(6673.819:23798): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5648.574291][ T30] audit: type=1400 audit(6673.859:23799): avc: denied { perfmon } for pid=12001 comm="syz.0.2733" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5648.575747][ T30] audit: type=1400 audit(6673.919:23800): avc: denied { perfmon } for pid=12001 comm="syz.0.2733" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5652.353385][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 5652.353597][ T30] audit: type=1400 audit(6677.779:23812): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5652.646128][ T30] audit: type=1400 audit(6678.069:23813): avc: denied { create } for pid=12005 comm="syz.1.2734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5652.690397][ T30] audit: type=1400 audit(6678.119:23814): avc: denied { create } for pid=12005 comm="syz.1.2734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5652.754660][ T30] audit: type=1400 audit(6678.169:23815): avc: denied { write } for pid=12005 comm="syz.1.2734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5655.497951][ T30] audit: type=1400 audit(6678.279:23816): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5655.499635][ T30] audit: type=1400 audit(6678.419:23817): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5655.501140][ T30] audit: type=1400 audit(6678.479:23818): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5655.502546][ T30] audit: type=1400 audit(6678.519:23819): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5655.503987][ T30] audit: type=1400 audit(6678.619:23820): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5655.505435][ T30] audit: type=1400 audit(6678.739:23821): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5657.439541][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 5657.439763][ T30] audit: type=1400 audit(6682.709:23832): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5657.441911][ T30] audit: type=1400 audit(6682.749:23833): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5657.443140][ T30] audit: type=1400 audit(6682.769:23834): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5657.468440][ T30] audit: type=1400 audit(6682.809:23835): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5657.469928][ T30] audit: type=1400 audit(6682.859:23836): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5657.528003][ T30] audit: type=1400 audit(6682.939:23837): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5657.596296][ T30] audit: type=1400 audit(6683.019:23838): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5657.639502][ T30] audit: type=1400 audit(6683.059:23839): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5657.689656][ T30] audit: type=1400 audit(6683.109:23840): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5657.743260][ T30] audit: type=1400 audit(6683.149:23841): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5662.576293][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 5662.576482][ T30] audit: type=1400 audit(6687.729:23874): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5662.579936][ T30] audit: type=1400 audit(6687.779:23875): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5662.580913][ T30] audit: type=1400 audit(6687.799:23876): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5662.581938][ T30] audit: type=1400 audit(6687.819:23877): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5662.582885][ T30] audit: type=1400 audit(6687.839:23878): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5663.288938][ T30] audit: type=1400 audit(6688.019:23879): avc: denied { open } for pid=12005 comm="syz.1.2734" path="/dev/ttyq7" dev="devtmpfs" ino=374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 5663.290777][ T30] audit: type=1400 audit(6688.279:23880): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5663.292725][ T30] audit: type=1400 audit(6688.329:23881): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5663.294117][ T30] audit: type=1400 audit(6688.349:23882): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5663.295362][ T30] audit: type=1400 audit(6688.379:23883): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5669.293143][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 5669.293259][ T30] audit: type=1400 audit(6694.719:23900): avc: denied { read write } for pid=10126 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5669.728832][ T30] audit: type=1400 audit(6694.839:23901): avc: denied { read write open } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5669.730669][ T30] audit: type=1400 audit(6694.919:23902): avc: denied { ioctl } for pid=10126 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5672.876505][ T30] audit: type=1400 audit(6695.529:23903): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5672.878839][ T30] audit: type=1400 audit(6695.709:23904): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5672.879756][ T30] audit: type=1400 audit(6695.749:23905): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5672.881197][ T30] audit: type=1400 audit(6695.789:23906): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5672.882146][ T30] audit: type=1400 audit(6695.839:23907): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5672.882929][ T30] audit: type=1400 audit(6695.959:23908): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5672.884184][ T30] audit: type=1400 audit(6696.079:23909): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5674.539626][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 5674.539869][ T30] audit: type=1400 audit(6698.859:23930): avc: denied { prog_load } for pid=12014 comm="syz.0.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5674.541855][ T30] audit: type=1400 audit(6698.909:23931): avc: denied { bpf } for pid=12014 comm="syz.0.2736" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5674.543210][ T30] audit: type=1400 audit(6698.919:23932): avc: denied { ioctl } for pid=12015 comm="syz.1.2737" path="socket:[32443]" dev="sockfs" ino=32443 ioctlcmd=0x89f6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5674.544542][ T30] audit: type=1400 audit(6698.929:23933): avc: denied { perfmon } for pid=12014 comm="syz.0.2736" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5674.545902][ T30] audit: type=1400 audit(6699.039:23934): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5674.568495][ T30] audit: type=1400 audit(6699.129:23935): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5674.570121][ T30] audit: type=1400 audit(6699.179:23936): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5674.571434][ T30] audit: type=1400 audit(6699.219:23937): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5674.572767][ T30] audit: type=1400 audit(6699.269:23938): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5674.574079][ T30] audit: type=1400 audit(6699.389:23939): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5680.507378][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 5680.507492][ T30] audit: type=1400 audit(6705.589:23960): avc: denied { ioctl } for pid=12015 comm="syz.1.2737" path="socket:[32443]" dev="sockfs" ino=32443 ioctlcmd=0x8940 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5680.508906][ T30] audit: type=1400 audit(6705.879:23961): avc: denied { module_request } for pid=12015 comm="syz.1.2737" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5680.509733][ T30] audit: type=1400 audit(6705.899:23962): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5680.777934][ T30] audit: type=1400 audit(6705.959:23963): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5680.781609][ T30] audit: type=1400 audit(6706.009:23964): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5680.783027][ T30] audit: type=1400 audit(6706.059:23965): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5680.798580][ T30] audit: type=1400 audit(6706.089:23966): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5680.799933][ T30] audit: type=1400 audit(6706.189:23967): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5681.357863][ T30] audit: type=1400 audit(6706.339:23968): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5681.358940][ T30] audit: type=1400 audit(6706.389:23969): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5683.170112][T12027] ================================================================== [ 5683.170587][T12027] BUG: KASAN: global-out-of-bounds in bit_putcs+0x7a4/0xa08 [ 5683.170856][T12027] Read of size 1 at addr ffff800085603d70 by task syz.0.2738/12027 [ 5683.171118][T12027] [ 5683.171275][T12027] CPU: 0 UID: 0 PID: 12027 Comm: syz.0.2738 Not tainted 6.12.0-syzkaller-07749-g28eb75e178d3 #0 [ 5683.171372][T12027] Hardware name: linux,dummy-virt (DT) [ 5683.171443][T12027] Call trace: [ 5683.171498][T12027] show_stack+0x18/0x24 (C) [ 5683.171599][T12027] dump_stack_lvl+0xa4/0xf4 [ 5683.171699][T12027] print_report+0xf4/0x5a4 [ 5683.171785][T12027] kasan_report+0xc8/0x108 [ 5683.171888][T12027] __asan_report_load1_noabort+0x20/0x2c [ 5683.171973][T12027] bit_putcs+0x7a4/0xa08 [ 5683.172061][T12027] fbcon_putcs+0x2c0/0x3c0 [ 5683.172149][T12027] do_update_region+0x15c/0x334 [ 5683.172231][T12027] update_region+0x98/0x118 [ 5683.172309][T12027] vcs_write+0x4e8/0xa80 [ 5683.172394][T12027] vfs_write+0x1d8/0xad0 [ 5683.172482][T12027] ksys_write+0xec/0x1d8 [ 5683.172570][T12027] __arm64_sys_write+0x6c/0x9c [ 5683.172665][T12027] invoke_syscall+0x6c/0x258 [ 5683.172767][T12027] el0_svc_common.constprop.0+0xac/0x230 [ 5683.172868][T12027] do_el0_svc+0x40/0x58 [ 5683.172955][T12027] el0_svc+0x50/0x180 [ 5683.173041][T12027] el0t_64_sync_handler+0x10c/0x138 [ 5683.173127][T12027] el0t_64_sync+0x198/0x19c [ 5683.173248][T12027] [ 5683.173350][T12027] The buggy address belongs to the variable: [ 5683.173401][T12027] type_check_kinds+0x370/0xa40 [ 5683.173489][T12027] [ 5683.173613][T12027] The buggy address belongs to the virtual mapping at [ 5683.173613][T12027] [ffff8000852a0000, ffff800086a10000) created by: [ 5683.173613][T12027] paging_init+0x384/0x564 [ 5683.173724][T12027] [ 5683.173926][T12027] The buggy address belongs to the physical page: [ 5683.174327][T12027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45803 [ 5683.174725][T12027] flags: 0x1ffc00000002000(reserved|node=0|zone=0|lastcpupid=0x7ff) [ 5683.175824][T12027] raw: 01ffc00000002000 fffffdffc01600c8 fffffdffc01600c8 0000000000000000 [ 5683.175920][T12027] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 5683.176119][T12027] page dumped because: kasan: bad access detected [ 5683.176196][T12027] [ 5683.176256][T12027] Memory state around the buggy address: [ 5683.176674][T12027] ffff800085603c00: 00 05 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 f9 f9 f9 f9 [ 5683.176866][T12027] ffff800085603c80: 03 f9 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 f9 f9 f9 f9 [ 5683.176966][T12027] >ffff800085603d00: 00 07 f9 f9 f9 f9 f9 f9 00 07 f9 f9 f9 f9 f9 f9 [ 5683.177056][T12027] ^ [ 5683.177248][T12027] ffff800085603d80: 00 06 f9 f9 f9 f9 f9 f9 06 f9 f9 f9 f9 f9 f9 f9 [ 5683.177308][T12027] ffff800085603e00: 00 06 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 [ 5683.177468][T12027] ================================================================== [ 5683.270427][T12027] Disabling lock debugging due to kernel taint SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 5685.518190][ T30] kauditd_printk_skb: 43 callbacks suppressed [ 5685.518380][ T30] audit: type=1400 audit(6710.939:24013): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5685.858052][ T30] audit: type=1400 audit(6711.259:24014): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5686.099051][ T30] audit: type=1400 audit(6711.519:24015): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5686.171551][ T30] audit: type=1400 audit(6711.599:24016): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5686.285179][ T30] audit: type=1400 audit(6711.709:24017): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5686.327495][ T30] audit: type=1400 audit(6711.749:24018): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5687.137826][ T30] audit: type=1400 audit(6712.229:24019): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5687.139318][ T30] audit: type=1400 audit(6712.309:24020): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5687.140483][ T30] audit: type=1400 audit(6712.349:24021): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5687.141675][ T30] audit: type=1400 audit(6712.389:24022): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5688.374403][T11733] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5688.665514][T11733] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5689.610046][T11733] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5689.861859][T11733] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5691.923013][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 5691.923246][ T30] audit: type=1400 audit(6717.349:24039): avc: denied { read } for pid=3124 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 5692.075255][ T30] audit: type=1400 audit(6717.499:24040): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5692.155619][ T30] audit: type=1400 audit(6717.579:24041): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5692.194129][ T30] audit: type=1400 audit(6717.619:24042): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5692.243290][ T30] audit: type=1400 audit(6717.659:24043): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5692.297774][ T30] audit: type=1400 audit(6717.719:24044): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5694.228523][T11733] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5694.310767][ T30] audit: type=1400 audit(6719.739:24045): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5694.315376][T11733] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5694.343124][ T30] audit: type=1400 audit(6719.769:24046): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5694.361397][ T30] audit: type=1400 audit(6719.789:24047): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5694.387985][ T30] audit: type=1400 audit(6719.809:24048): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5694.391576][T11733] bond0 (unregistering): Released all slaves [ 5694.536273][T11733] hsr_slave_0: left promiscuous mode [ 5694.643981][T11733] hsr_slave_1: left promiscuous mode [ 5694.821960][T11733] veth1_macvtap: left promiscuous mode [ 5694.822998][T11733] veth0_macvtap: left promiscuous mode [ 5694.824177][T11733] veth1_vlan: left promiscuous mode [ 5694.825089][T11733] veth0_vlan: left promiscuous mode [ 5703.273926][T11733] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5703.466033][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 5703.466223][ T30] audit: type=1400 audit(6728.889:24064): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5703.501416][T11733] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5703.570414][ T30] audit: type=1400 audit(6728.999:24065): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5703.625190][ T30] audit: type=1400 audit(6729.049:24066): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5703.698395][ T30] audit: type=1400 audit(6729.099:24067): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5703.743001][ T30] audit: type=1400 audit(6729.169:24068): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5703.745184][T11733] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5703.887856][ T30] audit: type=1400 audit(6729.309:24069): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5703.971491][ T30] audit: type=1400 audit(6729.399:24070): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5703.995462][ T30] audit: type=1400 audit(6729.419:24071): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5704.023879][T11733] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5704.037926][ T30] audit: type=1400 audit(6729.459:24072): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5704.057269][ T30] audit: type=1400 audit(6729.479:24073): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5709.581023][T11733] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5709.706009][ T30] audit: type=1400 audit(6735.129:24074): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5709.787716][ T30] audit: type=1400 audit(6735.209:24075): avc: denied { search } for pid=3079 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5709.807802][ T30] audit: type=1400 audit(6735.219:24076): avc: denied { append } for pid=3079 comm="syslogd" name="messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5709.848687][ T30] audit: type=1400 audit(6735.259:24077): avc: denied { append open } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5709.852824][ T30] audit: type=1400 audit(6735.279:24078): avc: denied { getattr } for pid=3079 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=16 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5709.948992][T11733] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5710.135385][ T30] audit: type=1400 audit(6735.559:24079): avc: denied { search } for pid=12047 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5710.172098][ T30] audit: type=1400 audit(6735.599:24080): avc: denied { search } for pid=12047 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=462 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5710.248528][ T30] audit: type=1400 audit(6735.629:24081): avc: denied { search } for pid=12047 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=603 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5710.251574][T11733] bond0 (unregistering): Released all slaves [ 5710.316056][ T30] audit: type=1400 audit(6735.739:24082): avc: denied { search } for pid=12047 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=604 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5710.598004][T11733] hsr_slave_0: left promiscuous mode [ 5710.650882][ T30] audit: type=1400 audit(6736.079:24083): avc: denied { read } for pid=3079 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5710.668844][T11733] hsr_slave_1: left promiscuous mode [ 5710.833097][T11733] veth1_macvtap: left promiscuous mode [ 5710.834190][T11733] veth0_macvtap: left promiscuous mode [ 5710.835375][T11733] veth1_vlan: left promiscuous mode [ 5710.836323][T11733] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 00:40:30 Registers: info registers vcpu 0 CPU#0 PC=ffff80008526394c X00=ffff800085263948 X01=0000000000000000 X02=0000000000000000 X03=1fffe00002dbb791 X04=1fffe00002dbb791 X05=ffff800080006890 X06=ffff700010000d12 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700010000d12 X11=1ffff00010000d12 X12=ffff700010000d13 X13=0000000000000000 X14=0000000000000001 X15=0000000000000000 X16=fe4800008ceeffff X17=2c3fd919e421f3e2 X18=ffff00001a29f280 X19=ffff800086f1b6b0 X20=ffff000016ddbc80 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff800086f1b680 X25=0000000000000000 X26=0000000000000006 X27=ffff800086f1b6b0 X28=1fffe0000d3f133b X29=ffff800080006800 X30=ffff80008041bd3c SP=ffff800080006800 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000fffff30ba820:79e03261cbafaf00 Q02=0000ffff9d0ce000:ffffff80ffffffd8 Q03=0000fffff30ba8b0:0000fffff30ba8b0 Q04=0000fffff30ba8b0:0000fffff30ba868 Q05=0000fffff30ba880:0000fffff30ba8b0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff30baac0:0000fffff30baac0 Q17=ffffff80ffffffd0:0000fffff30baa90 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008096f114 X00=ffff80008cc61ae8 X01=0000000000000000 X02=1ffff00010d9b9c1 X03=1fffe00002d73448 X04=00000000f204f1f1 X05=ffff80008d857038 X06=ffff80008d8570e0 X07=ffff80008d857190 X08=ffff80008d857088 X09=dfff800000000000 X10=ffff700011b0ae10 X11=1ffff0001198d11d X12=ffff70001198d11e X13=dfff800000000000 X14=ffff000069f973b0 X15=0000000000000000 X16=ffff80008ce90000 X17=ffff7fffe3313000 X18=0000000000000000 X19=ffff000016b99e40 X20=0000000000000001 X21=0000000000000001 X22=ffff80008cc678e0 X23=ffff000016b99e40 X24=ffff80008cc61b38 X25=0000000000000078 X26=dfff800000000000 X27=ffff80008cc5f8e0 X28=ffff80008cc68000 X29=ffff80008d856ff0 X30=ffff800080032848 SP=ffff80008d857050 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0500000000000000:0500000000000000 Q01=0000000500000000:0000000000000000 Q02=0000000000000005:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000005:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff30baac0:0000fffff30baac0 Q17=ffffff80ffffffd0:0000fffff30baa90 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000