last executing test programs: 1h3m50.175684709s ago: executing program 0 (id=1191): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x80082, 0x0) write$vga_arbiter(r0, &(0x7f0000000200)=@other={'decodes', ' ', 'io+mem'}, 0xf) 1h3m49.790242631s ago: executing program 0 (id=1192): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=@newsa={0x104, 0x10, 0x7, 0x0, 0x0, {{@in6=@mcast1, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x4e20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xee00}, {@in6=@mcast1, 0x2000000, 0x3c}, @in6=@private0, {0x10001, 0x0, 0x2, 0x7, 0x10000000, 0xad}, {0x6, 0x200000, 0x7}, {0x40000, 0x1008, 0xae8}, 0x70bd28, 0x0, 0xa, 0x1}, [@coaddr={0x14, 0xe, @in=@remote}]}, 0x104}}, 0x0) 1h3m49.317200028s ago: executing program 0 (id=1193): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='target PCI:'], 0x16) 1h3m48.683791693s ago: executing program 0 (id=1194): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = getpid() ptrace$setopts(0x4200, r1, 0x0, 0x75) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611065000000000004000000000000000400000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) pipe(&(0x7f0000000500)) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(0xffffffffffffffff, 0x0, 0x4000) r2 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r4, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newtaction={0xb0, 0x30, 0x1, 0x70bd29, 0x25dfdbfb, {}, [{0x9c, 0x1, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x2, 0x9, 0x4, 0x8be6, 0x5}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x1}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}, @m_skbedit={0x48, 0x2, 0x0, 0x0, {{0xc}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x2, 0x3, 0x6, 0xffffffff, 0x3}}]}, {0xfffffd12}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4081}, 0x2400c800) socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = socket(0x11, 0x2, 0x0) setsockopt(r6, 0x107, 0x1, &(0x7f0000000000)="110000000000060000071a", 0xb) bind$packet(r0, &(0x7f0000000040)={0x11, 0x1, 0x0, 0x1, 0x9, 0x6, @multicast}, 0x14) socket$nl_route(0x10, 0x3, 0x0) 1h3m44.369248649s ago: executing program 32 (id=1164): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) socket$inet_icmp_raw(0x2, 0x3, 0x1) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x16, 0x3, 0x0, 0x0}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) fsopen(0x0, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) 1h3m2.952170367s ago: executing program 33 (id=1194): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = getpid() ptrace$setopts(0x4200, r1, 0x0, 0x75) bind$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611065000000000004000000000000000400000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) pipe(&(0x7f0000000500)) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(0xffffffffffffffff, 0x0, 0x4000) r2 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r4, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newtaction={0xb0, 0x30, 0x1, 0x70bd29, 0x25dfdbfb, {}, [{0x9c, 0x1, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x2, 0x9, 0x4, 0x8be6, 0x5}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x1}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}, @m_skbedit={0x48, 0x2, 0x0, 0x0, {{0xc}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x2, 0x3, 0x6, 0xffffffff, 0x3}}]}, {0xfffffd12}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4081}, 0x2400c800) socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = socket(0x11, 0x2, 0x0) setsockopt(r6, 0x107, 0x1, &(0x7f0000000000)="110000000000060000071a", 0xb) bind$packet(r0, &(0x7f0000000040)={0x11, 0x1, 0x0, 0x1, 0x9, 0x6, @multicast}, 0x14) socket$nl_route(0x10, 0x3, 0x0) 1h1m8.868974829s ago: executing program 34 (id=1257): bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000340)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) syz_emit_ethernet(0x36, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e000000620a00ff0000000061008c0500000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) 58m56.828707979s ago: executing program 35 (id=1339): sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[], 0x48) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f00000003c0)="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", 0xfffffffffffffd8a, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fchdir(r2) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') mount(&(0x7f0000000000), &(0x7f0000000040)='./cgroup\x00', 0x0, 0x245059, 0x0) 58m30.671652386s ago: executing program 3 (id=1407): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) 58m30.573157621s ago: executing program 3 (id=1408): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001100)=@migrate={0xa0, 0x21, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x64010100, @in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2e}, 0x0, 0x1}, [@migrate={0x50, 0x11, [{@in=@private=0xa010101, @in=@loopback, @in6=@empty, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3c, 0x4, 0x0, 0x2, 0xa, 0x2}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x6a8dd86ef567f079}, 0x4020800) 58m30.459517147s ago: executing program 3 (id=1409): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="150000001000000008"], 0x50) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000005000000b70000000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x77) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x8, 0x3, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000001200)='syzkaller\x00'}, 0x80) r4 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r3, r5}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYRES32=r2], 0x20) 58m30.333843404s ago: executing program 3 (id=1410): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x1, 0x4) 57m45.334912108s ago: executing program 36 (id=1410): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x1, 0x4) 57m29.685854291s ago: executing program 37 (id=1427): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) setsockopt$inet_int(r0, 0x0, 0x4, 0x0, 0x0) 57m12.728461716s ago: executing program 38 (id=1438): r0 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@newtfilter={0x38, 0x2c, 0xd27, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, r1, {0x2, 0xe}, {}, {0xa, 0xf}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_HASH={0x8, 0x2, 0xffffffff}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x40850) 50m51.113076145s ago: executing program 7 (id=1863): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x1003ff}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) statfs(0x0, 0x0) 50m43.923201305s ago: executing program 7 (id=1871): r0 = socket(0xa, 0x3, 0xff) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000300)=0x56) 50m43.713427834s ago: executing program 7 (id=1872): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) 50m43.493089323s ago: executing program 7 (id=1873): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 50m43.34336864s ago: executing program 7 (id=1874): r0 = landlock_create_ruleset(&(0x7f0000000040)={0x4000, 0x3}, 0x18, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000080), 0x1ff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000200)={0x28f, 0xfff, 0xa}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000700)={0x0, &(0x7f0000000000)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_CURSOR(r1, 0xc01c64a3, &(0x7f0000000340)={0x3, r2, 0xfffffffa, 0x4, 0xb, 0x1fd, 0x1}) ioctl$DRM_IOCTL_MODE_CURSOR(r1, 0xc01c64a3, 0x0) landlock_restrict_self(r0, 0x8) 50m40.192267976s ago: executing program 7 (id=1875): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() ftruncate(0xffffffffffffffff, 0x84) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000440)={'#! ', './file0', [{}]}, 0xc) close(0xffffffffffffffff) socket(0x21, 0x80000, 0x100003) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000020303000000000000000000000100000800010001"], 0x1c}, 0x1, 0x0, 0x0, 0x20044840}, 0x20000010) sendmsg$NFQNL_MSG_VERDICT_BATCH(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="20000000030301010000000000000000000000000c0002"], 0x20}, 0x1, 0x0, 0x0, 0x94f7cfd7d575e2fc}, 0x0) 49m54.853197502s ago: executing program 39 (id=1875): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() ftruncate(0xffffffffffffffff, 0x84) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000440)={'#! ', './file0', [{}]}, 0xc) close(0xffffffffffffffff) socket(0x21, 0x80000, 0x100003) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000020303000000000000000000000100000800010001"], 0x1c}, 0x1, 0x0, 0x0, 0x20044840}, 0x20000010) sendmsg$NFQNL_MSG_VERDICT_BATCH(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="20000000030301010000000000000000000000000c0002"], 0x20}, 0x1, 0x0, 0x0, 0x94f7cfd7d575e2fc}, 0x0) 19m57.501421749s ago: executing program 9 (id=4273): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000380)={0x1d, r1, 0x2, {0x2, 0x0, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x2, 0x3}}, 0x20) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)={0x1e8, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0x5}, {0x5}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0xb}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x40}, {0x6, 0x16, 0xaa5}, {0x5}, {0x6, 0x11, 0x3}, {0x8, 0xb, 0xfffffffd}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0xfffffff8}, {0x6, 0x16, 0x5}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0xb49}, {0x8, 0xb, 0x4}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xffffb1be}, {0x6, 0x16, 0x2}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x4}, {0x8, 0xb, 0x51}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0xff}, {0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x3929}, {0x8}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x5}, {0x6, 0x16, 0x6}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x348}, {0x8}}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x588c0}, 0x4000) 19m47.997769858s ago: executing program 9 (id=4279): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000340)={0x0, 0xfb, 0xc4, 0x6, 0x8, "b077708ac025db2d5ccbffacc4c729da", "52e1af7dad0811cbf91bb0b96f84b987764bd033ad507519641f261edcdff59207fd907702ec7003b7a30a3ae13ba61dc129cc1b61467bb2407fa3ba0b7b8fb67f266e6ea7555168d3e5ab022447045cadf04c941ac2c214c0122901e9709c0ea2bed137eea7e9c7dc3de398385307d2cb6cba2dd510a8b852309d63a143aabdff2e78018f3bef725acfaa29acdbc6cc98bf62f18552f2a8fa362894dbb24f6c40ed228d7fecfa507167341bea0579"}, 0xc4, 0x2) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000008300), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f0000000000), 0x200000, &(0x7f0000002100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) fcntl$notify(r2, 0x402, 0x25) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x682843, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) r4 = epoll_create1(0x0) r5 = fcntl$dupfd(r4, 0x2, 0xffffffffffffffff) chroot(&(0x7f0000000180)='./file0\x00') write$rfkill(r5, 0x0, 0x0) r6 = epoll_create(0xf) epoll_wait(r6, &(0x7f0000003300)=[{}], 0x1, 0x10000) socket$nl_route(0x10, 0x3, 0x0) r7 = openat$binder_debug(0xffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) fsetxattr$security_selinux(r7, &(0x7f0000000100), &(0x7f0000000140)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'wg0\x00', 0x8000}) syz_fuse_handle_req(r2, &(0x7f0000006300), 0x2000, &(0x7f00000041c0)={&(0x7f00000001c0)={0x50, 0x0, 0x0, {0x7, 0x29, 0x7, 0x22110039, 0x1000, 0x0, 0x7ff, 0x58, 0x0, 0x0, 0x6, 0x8}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r2, &(0x7f0000004300)="d5c2280baf4e05cfa1d1112770cf43a123827586f0f2675b130041ff58ba6533ea7947f2f65b1d458fe88a96133ea3927f41fa6976fad8c967c88679769ee674b80debcd1ec6ce1eb490888bd66a52141fa82f51882b22a8e36ff462b51560307cd0048156800ad137f359719a9c5d6ad6a8c999984f22461c4ca6614ca4cbbd5e9103a3459228e3bd35e3c1cd5f2a83fbefafe7c5a39617ba1d856f37977da077ffcf4d52f5bb3feffa9e100b0279cb635a61ae9f5f4491bb1c9f04c041818a1ae9a25cbca38c4b4754a8be4f52db20ca464b3b4faf0ea8ff193b414e7b7a4ec8aec2e77adc43d09c62d37fc0aa6296a56a9445f264a245d41e77de43c2694cc5885ebd454a3b78b60172e3e6a2fd79efa8b5fbbe827512aa0656920858da51616244ad32e53ed039a270c042662bc966a8fa05e23a51c76585a6f753e57c63b5a1dd11c4ce8773702c5c759471b79ee9bed600d99853afda9b675f071bdf6ff4eb99cb1ae0128ac1f8132f9b7bef82221276395e59f1323c9f9f6bb937a9db0bc2088670ffc3e6233ba73d4e324df7bc866e84e82ab707ab8aadd593913dd3533cddb396e804a63155ad6911962bc49bad21faba90b5570b62d98eb5328214a7198b36ea6df9a72dc248311040e01539112e1d6bcb4ed9d7fb70d22768ec6603e4727b6ed2616eb9108524985ccd70f1361f68b1fb7088829acdd59ec5af9e84409737f0d852a3c55993cb7398b5640c458bc036115b86de7b8e68f1cff882ee5707040571c3e5c9602c773459cfecad4917d8ba2902bd64a676e2c6e507d06dbc806c13c0fd18175087440ce7d7300dfe745b8e98ac63b400e449a3f2518c6112c9864fde68f580ebc2d72e4bbd03f16a7289be813c258b02f76ce901afdafc69046c947c9e801ac635b2a95cca291c052c7f8149c92aaeaab41edb34a70604a7538c4bb6486b983416843fe6a65d7b828d66deb991e71526b7627e71c6a795a02e787bc561ec4b65d4742a129c59bc71b323850cb416f3d32494d6dbfe3ea73cb473b093ae0b0ebbbd3e3251ece756b3cc381f05ea1b8c3f7fbcbb16fc446fc084725e6c3a608221aad8d8179112f9e5ee3697346a0dc0645e530df523cf4daea14764c25da2da863adebaccefc2c83a9257b3131ac2fe04a27bf3aea8979b6f3091b4fef99e203725368d297bad3b020273d0b606d2368e2ecb0776349cb86bbcbaa5c910636527e3cbeca06b4135170d8808c5f113fcd77ecb2f099d1e663617a46ffc5275c8fcc339d315ca1583f66fe7a7e6430405c0be889826c07fcafa17f04e08bc39570a1f499092d390c5dba82d259f652307ff941e9f1f569a48144da846f14452df295553de6ef4e9ba0cd98dd16cf89d8bead08eacd4eea71cc5f8232349f2d8519b1172c724d3bbc415c19c9e679b5a96bc9051cf6f243f243366622023ab1b7039a89152e7db97f291bb3f0213c445c25caf5f0a5a2b382c841cd8a490dc97d008966e94ed0b5ce07bcc0c13b39c349e4b596147a633f3a73ab6012a1582d3d283293bd7c01f99cdbad8e18d24867c39ed0dc3fc3cc800edd23af24b225acb2cca5aa264bcda40e1432cf2cc0050efdff48fd49ae4225a983d1b12facbaaba73294eb225fff64a677d0ed2cd71bab61b3fde8a1fdae638d2036283a8a4ff5a548d05cb706f56ce7e3f55a688fa6c70393c53c33be11f34a38f61f80c8e94e50fc9d7c3695d234705bb9e0b2a8316cf54d7963f548d49f153bf796d0970ed1264c19d79eb77fd0aad4844796cec73a08206b9eca76f2ad76318a20d52e7d3338eac40d03775cca0c2b29a451cb10bc141289c2703198e7137200a360463000fab97d0da72a7b4e8aadfa8a2e559a7d06bf49d6d4a932cb29994ef7ca0c1beabf05b898bb2338e89a67373d50614300f13523fe451d4058e5a522d364ec884099ee3c6e6db8d4ec1e5dc08d127b6301a308a1d6798878c28ef828b91b529a22b7519d249a189a7eb942b94ce26148ea8bf16a44261cd9691ba980ec2d0c710dbee41756cb39b88213ad5763239ae7636e983580c41a40b0f3a3af9fa6f995ed1981d073f63a623554bb01869bdfda190bc8d9507cc067b897e1c5f0d087cf8dfcb171169541fa3cce7c3a620544c74f2d3234935a0acf6c804c43992812925cbaaa24f497e7a00efb20c45c7acb80adb3322cbe0f08d1015b40f5ae1366003ebea977b7b95f803487d10aedca3fd018cfa7b267dae604ed0ada202cbebd731f86b7c6764911d4ff0c75a318ee43b1b556781ac58fbd773b2bd0dd693f9b12fa149bbe392cb2d6bf72015912f4a120e47654d42d14107c67b4502b5ad62044d0022c7f8b255a3e46da4bb8f9e44515e4076ce7b1aefd57c4e264b2cbee4a9e8612ce8517b028067644c927a9ce7564449c8fb0471a87b9b76f374c7c2559379a3004326bdc91be5ec52672dc5fac0883ec527f2a1248601bb9267c3123568b815b90b40ba06c250e3068dee2d7fc232141eaaa130443a5775d049464ec454a7c980d9eebaa4f67a75075a6bc28ded9a5f07fe658a2b9eafa37f14055155409d1aa50be6343d13d515d0531b84644d2f58c280d6d008dee95607f67eb74c900f664d97f411f4ac6afc18f11b6fb75e78b3ff25680ed3bbf5b20969678475b86faa02a751e4cec87735645753f245047371c9e6e2e7ab5a9ea3182b4c96934a21b9df3628b478f5ef705aeda49a0609d4b8f5bf34424581557d029438306002fd4e9cff5a2d4e7d5e23c2992032d314b8fbb46ccda250070fc1b679c9c8646c5fe22d8fe2e0fff73d8153fc46ef7885aeaa2d1eabbe455544d46fdef8e3ef9debfe589870942bcc7196e62736e927c311782b5e4da2889d530a7c1550bff4909d2055941655cbcc5c924a477c80fc3b8a904cd9e62f5fb005b5b00154db5becbe327c0f3ec8314ef3fb53977ec24ff7d15aa83a13b23ab99c5332306023005d2dfb70d3ea2aefababd019ae16d304c083e38997cc94bdeb746fc151849c98dc2a23554e6fe789d3aba8bf4e31133c7f93a3cdcd884271dfdd2c45be398a5349ef5d08456178dfafa31cb4c607f09394d71b3405b3d615c7c59c125db88f72380140345d24c56094711dd833221d6b7c5864d049585605c1301c31982d19e403b601b797fe99d0bbfe30d647a913da72b4c5306f6123e7c572828308a9a8f4c686d07125d0006229c2e890ff7d3c354dde61ccd3b26069a81a98e112e61a930f253d607cda5023f002a09df6b1371638d9661c5a06bed166434f07120ad21476de8ad47296af4b449d581cddc74f9be42a84596fb0634f330a856216a9b32b080c8b66e9f51a758b9ca2e1215ddfe633714ca512032f6547217b1a60fcdb27ac8a04bc7851718b38607bc92c13118a323c3221bad99a8639762abcc4a08654da9938aeb301c55546f5ae7f61439dd883a1b2dede156a57c805ab12337d5381a2fb25b32916a8827fc4de8e2ecc70eeebeb01659d6bf88055477b863fb897d5db275a0c222d261e7df79474858b721e57747fe8997faaf36f5f175b23dd3c5efb2b93fb5824da18d635cd7027a3b0b1c87e7c90a5681682b8a7c47dc82fdd3f329c7b60270100dec8ccdd310245b92f4b0bd9a92e1f2a5733b1b91966be15a4761b06f6fe3b05b60ee7964b4d028257c2210ca88031db0590190d3714c1b6ec86e2821dca03db2fc0c9f0ad9800d1773c8037e9b38c7eb7c99618b731e0526f8453c7e1bb67cffcc2d96cc297e1f917b13dd7dda2a8b12191ed107c1e076ffd4965b9415f830be97935cac23a87f07e26354273c2663c7ef19a27dfe08543fa057e1285c909051602981f5929078214058684bc80bed493f6ef853012cb654d180e414fd484f5cb2cfd06c9b753f417697ff42794649e05fcaa3d53ad0fdfbb0db57dc549115e59978b14dd621370d136176098af2f39a2de72482a29b616e8b308b3d9b46ac9abf3d57ff89fe59b5a97966cc4b97d06c20ee4fd765e1c2abce54dc271a7c7efe656648800c27a9988583b4b76572222cb28916b9ff5f6f649de93923179809405c879a90cb450f604cbe8af55cf2a6d844a59ab0393b394e09c79e1b3c403af6eba69330f6969f78a49eb7022e77a39363f11e07fcc69f670f63c11497352f3f5bfea0aee446da35428cebe28f1c2d23ef3ff97e16ceeb2f88ab19b2b69dcdcc81b947b483cc06c776c52232489f86f4c377eb38056042e2e9e0943fc0ef1490df472b9b244235598894a2ffc296f0a2e4257baca6a3ea8cfb1a22ea8295ab9e5faaa2a9e964ae7625dbf945cdbb369265f429d475ab69413cc5bcb89af57b1b966bd0076f799a401d4b46e5045aceb1ef36e5bbfb037bb7681f2a38ef1df9b84baa3598201d13a813165355bf052bb5e456dc0abdefed995b4eb37a39b313af800f6029243a6a7bec75a23389a90034cac8df6713b919028a14649d756d0093550278aad494de2dfeb76220fd3ee5be31f73839ace7f0d6da650e26f5ded30471ed55d2e814fc1b89102e5917b4e58840ecc211eaffa5a2937abeb882ccdf29308e3ac30e23d66ee79c29b4fb7e793a55e344cac298e30f1ca3333df8b58f43126a3404a61501ce06b75e6e6a4bf13dbfb05efd7b9b4219efd428c8f7f345884640d19f5515abcce05f315f00e65d9aa8022890a23da45ede06f455d66e0c96bbf7e9cc74eddca999a51174b4784eba8a9ebed13415de6bd0f160443d43b78181cfa381313a54e25f6751a38f290e5972ff7f70692e18c4737af2a7f6d4eac52ea594a22be4fd00fac1484e6d2d4d3196b49212b49598f5bc77b34d8a3633cf7212c869557d6eb27bf0d0a02555d9318194e9de9c9730ac72daee7cad6c2d4b248a8744515670766a8f1c739917fb859d98974532477989f4c24345f120f5320fdb8d8d56fa6ff2511e701bab399513cecb3e740e3761d02685a765f5267554d0f9243b51620197adc3b561b59c58f334307220db357c1121d7dbf593898b5d2c505f333445c084a6cbc6a7e5252724c83fcee85e304534780a01e7ecceb2ef53ffb6bc6cb9051b1400493ce55d62c01e972fff3cc7d0b68a2dd4d263c9191df1b629e323797f570083f122db3df6abb6fd6c4a351bb7500c7241e4392ac76e04259968e517a43e907cb0b0533d6750b9587a1a5d852639c6b789d333e848e3ad66cbf19c5ee5a641036cb7a858f822f657dec36cc134d6c1a629cfce1f1e24dbb73d09fba04f53b2c6309d71d92211a1f08535244eefcbb52e095626bcc78b950db1cb8facc3660fa705dceef155b00aef3291367ffcea06b5abe588bbdcea2637761308dc65509798b6a494dae4a75c1922c1234248dbfcabfaab3088a0dad09a135a45d75105314020f3ba8901dc39ee624a32e9f863ff55844974b44e57b30302cd0c349f3cc091befd5665f918c298ba89454fb811ce573e41f27490853a52abd6144e85d77de88c3f2e5506c8de40a3957e65936f3b294ce92610b63cec888cb16fe0e8a7af3dd142da96b57f602cc64ba69966724584c2872e5fc42348a324ff082a3ecfded82c3e5b7292d3726c4800176acab6a7a1479a0b5fea79f299e90ffdb1b3843e2349b8f8dc7881145b3796380474c2ceb57e27726c9e50b746a2b12a214fea9cfd6c668363fe6e402710665118928fedb2f4900322b0c7d2c348881ea52278dae765c14b51fd5e8f000602aa3978d83b76056410c2260931e35d841793c8a36b191f93c33c0e4e6367ef45a1cf5145d774861224afbb11a7b77bb94492ec49827f713f8309d80d22e17701046e04c5b277f7b423cbbada01e6d40beb56e755e583b8f3de4b67c4b5ac83771b805fa7af49de2fc8b9a223293d83e7eb4eea3a3af1d1221e5d458e7cab60eaf1b51550a1b125ce018d76096f16d922f4aba48a728ec1b7d4812fe2ca789261b6d8e0c8edb3ba9007649084899c4f6b7986c1cb4a98d412c801fb91675ee42e2bb511bff6700772d3c03a7cb6adb41cbddc33053f8f65c164e9bd47b931510046506b169216d0a04edc479bc51c28acc536ced3834a7a9ce8fb55b72fa186a559437bf41f04b733e05986c915bc19f1b2f99d3bae6c13873d32e3c809b71881c3075f8dd1746f36409ac7934c25236ee2752560fcdd5175037a6fc5f0da58a229418ce30f3e64f9eb6ff3fe4498f47fdd69ceac5e792c8c9f087316f334b7f75e3432d3f1d03ee97c8f16485ec906c94e6c9580f7d03d98a8da85ec118b77c6c1d3b2e99fbf4b45e66cb4f8817f786d1f90e1e5e250be8c240a9648a219a02e62acbd72d1b0c0b42c75065a35664ea6a03cb05ea179f2e8e50e3d7ed53d31cdc10cf5fce48781fa338e3ee819f410540f045cb0edd7b2d219993faaa97cf95aa6144e889a02069421291d05eade30693a751039fece452c22d1afba081d1c40178fed7684cae475fcc365484118a184670cd7aa2758bdb01058ea9b244d5241f627bc5be11c9395e3cb839b0eac7842a312e1fc8b4ddae2aa4ef907ca5c9b847785051323e16d5497c4424289496277475bba67da750fa05bd8be730e4aabaeb94641fa2263dd3d4eb511b4fa40b8cf8b16d7aded1163f2258add79b04e1eb888afa27d057de2523863fc2da38d44cc69ae2d455900eede5fce69d7e9f8707cdb2456a45dda14d257eee4982f86259b855a0293068aa4aeff9439bc06c8ed5a370fe46fa88fa9bb92872166ac69152d1cbb4720eec5b9a057890cbb838aef12091454fe721395b46f9fa29ec1829fedf65aaec1176bb9eb15511bd77e7d4fe7321b3e0dfda95e5c90c3663956477885d6d94b280f58edbc77e864dca73536cd4988bcde2a3edb91704ad59148d85a001e393cebdb56ee088fa1033cdc6fbcbea30e2974035bfe29cee1eace13e30950bb4658886dae7e565ffd7b71e41feecbcac35fd97c81a8fff9d2a1d43f183c6e984671e06645eb0a60228d1b6c12c28bc6eaa4b9125c57b48ced2e199ed3acf12dbe10af4a56f2f5dca829fd07fc3f7e0de6913c73be0ada3e43bcbe70de784de699d0b51d7a56a3eacaf5d7dcd77d73cfb82e04633574213e05dc98850d822bc6dc90dc3fd6184296287342e2243fe6f0cf94e6d02a1b900d0c718e2afbe7fea2fafa375f209fb9cef5d844b861a1029aa3dd7081e81fe6501bbb413dcd23e013f279ef87e082335ade324b7688054992ccc63fbf9153213ab6d07ed0b79945d19639aaa5dd10e53aafe57f1e323300246cb1d6ede1eb1f319ca6fe1b0cc8e733b34818425888110b6eabe2db302310d0a8bcdd5342146b29c535cc9a95a455c8926d77323a31b948d47dc611815a329654a252fd09dbcec5f3cd8bc7e465759eb8e72ff6fd4ef1f375e4e8762a58148622d14480b7bb9aca2eeab3367a7376c9c85e6ba1735e56a2fcc6baf92c8d21942883f318eab7a568fc7ff01885a7089aa7661b15d73799bc0b8f8ce6a3b61adb6949965a223850b6825616c036e099952e04fde7cf086b5e76d45b86ab78b322f9af580173f2e798a39df7cade0d365c9d46d3fb36970f8a99d7b20a1b275afff852126f21ac24ca8c34deb49ba511f4d9edb4f56941aaaa477253f9bfc9a25a2694bbbe3b917074dd4eb6f1be20395ac33dd932a7ccf0604d64257b5af3faf271c145c190a528e471a7f23a53b5f9ea1bd0cc36410e9c538e91dd01d162edde856087b60dcba2042e65b6ae7b81787bd3308db9eb025b6fd930a9eb74a30883b83cfa8be5270dd3ee3408db7f7b136adebb3ee30f0e0b8835a0ded325363e4a2991cafd4a73483954c0f5d3358b25780608fa48f3f527c7e617ec12eb017df33f5088676d8bc476da251e608394e3d8fc0883fd4d1804f8e07f5e12ffa4ee80365a88abf29936bf1b255539fef95f5cf3bebcd26817edb28e7b6adf4851dcfe8aa1aa097f67c51557326ccf9c46ee2780d491e87774324d4dcf26f2e472a5e199b0cdef01094ea72bd5ad5fe1be6c9d545df3dc5de550665d220718a2c0baed2833cfb1428e2d1c2b9ea1e29f4b07fd6c51492643d4000716cd1e8a4f9d58b6b04b805d8962495323fd62949b17348418201664c6f2f651f99d73f8d17bb5e52dba2e6f94fa33f816d74bb6a45bd6cbdbd07f530406227c8fd11f390e805bbc17bc0e81076a27c0be023b64777afec0a7a0c3f53f03bc2ca72ae2873d68217a1a6905f414c2cb1b9561dfd07850a026da5f5775a66f8f3a6bc29b48c8a81b06ba30994ba8e7e233e3a3a5d886767ea6de91fbfc0a594c2375d62e71c7209d87d0f6c7a79a0d80da328e93f08650ec745495c771410913d094e4190075b7225761172eb420c82ab493548f6de38e17d3e687a89ce77c67c58b875c48c8a4d1664cbc6f67df357e040444fcd515d92d5823fc3ef6485208b6f3eda8cd09ea3b004f7eb06ac268ae8c3bf571aa3f619222a47540f9af340c80c587f7226e3d715b18c3ee41f64777d3a0a09f32190ad67922f6ecc63c956a715c3c42a6aaaf5e588d119210083ceaa414820b62fef87a678cd3f24f8fa3cdb6629b041cd7555974313f56d1b0e117ea925dc95e18b5d3f4ba9812f1067022945c3f5d547370d45853c4db3c9ca4436d7e649e1ac3ec02f9c1e9139849b46027d4b276cb0eb4b09848999f466f528290e47ba9540ceca89390db3fcbacb1d566e22e917f01f4442bd4dd0d350d057ffdf5b3549ca559901e6ff5147bdc25c11b23f1678f02c20e4e2e6f339b262e2b82eae0b15b4227f1d514f99ec78fbcf80c8f6f243536f2d7a809de05ae5e1d676fe950ad3513f801bbe4d16737def4b5ec4b62f8562cd5432bd372645202edeb286662d7e8d0dadac5b91c903c2756bdc4f5a7c931f2c3f7feace2b83f5459a196000e2ed1e1b2accaa9d637d5e408340161331c4b0047bf2ab31d317bb1c8f6e1b3d52f9f240bd971a447942dd4b73301781656aad9ce9b01aed907b7eb3a78397b97e601b04a4cb028d327ef32cf20c34e8dad9c9b1f981ab5c06a2b0271852e2a1016ee460d8568391c9ece5a2b8f29cbc6f2d6cc2e66c30c96df548e67dd6ad8c1ff09dfa22b2e8b2c52a3948c4febb09e3c2d34c0604a5ef930cd53be69a4bed9c9ee057178ece02a6b4df4624191590952888bdfafd2dbeca128d500872a8b236fba9623672c4dc15f56a761ee0c54026112fc464f72d3039587f009b94930dac0dbe444a939b38c0f5bce7aa366bfc2bb909db231178228846f71a56ab219e28cef1b102c1bfadbe8f0916d10a573b8cb38cc2cc2ec496a410a4e82847006d2ed4bac927a63a00416d0bfce59cc69aaf78ddc9566f23582999a655c8ad3b217486fb5a037ce089baf344d55bbd475be4e90b10e92c9c1bae3202c2d63355549f0ac95058724fea81ff9cec027e7b93e2cee43af81c6978fee5faf6216118785251b8ca023115b2f87d5d4b10c29aa3616628ab40a8ef36668ef57d7f9be505eabc01947ca222362818a71b3d63e5725a4d8a2c619b1867f70daa07703360d026d6f65247330be1ba84ddaaa7779591ca261beda4f4c094af65c5c276fe3bfb89f067c8c54af67e78f61bdc114ed4aa869c3adf282d7a8e7272579e9fd9e47611e0dc89f97561110e0141c69b1fa114e27b3d1e2c825ea008a370e08cd0a0610edef20cdd8a7cda0922fff046edfd2ff391a10ffce5dd6045619ce9af6b03f4193d858a76b201ed5beb0f11321707b7b593b23adaee4a0c0caf39dfeebcbd2948030435dc94ca00990c728502ec4686194f0f454304a422023c1b2c5b1ebbcd8cd50fa2d11361e3bbdc306e2739e27de300eda27b1c1ea62d773104cea77c18037c6bcc76423621b45abbe789b384bfdfb46efa1627ff29d9d840bf6e1f05e7e13fae6383e42ce153dcb062fa0cefd0fe9298ddbe77fd78d7036b5a815504b48267203da08ca685bfe8ae89c031074bbe5d3d6dcc6a3a8a8a4d3102765c3b714867f4516df62f214351b97bb8b5697a9f9a9dd78627342b239c524a3943d1d70f8cdd7391f05e7395731a8fc05210c6733ea256040bbbb53389229b84dafaaa3db1d5eca2971d9e550149461f1a672eae2319a99beed48934520666bc54b63085a744b5fc9a9b089b16c50ae945f74adcd4c5d064a12a6e103ef59bcc035a755ad31836eb7d04e5900d3800c822b96b466a9f6611f46b8a7d6131f91c625a5604de5bf01e5ca5d99a714c8dc1160260010f8d55f9125ee453b61c911bdf0824caa804c76d6512802875c5433de9b2e8b6c579a67fec5d2bc64ed3d1c313854221b75c9a0ed42af6f5354e7b1d1bf8661baa1261e68fc20d14b5652d25a536f208bff2b90fefa163a232696e655bcf95bed39355ec865e272fed582aae18858f5096ece40b9108efb00147f9c2ced59bfe2a79826851850ed95b35908dfb4d9ab7da0668a1fa8933ac4f6534e9598481477791fd1a1c269011ac9fe81f0491790e8aac121ffc00e38a7619a1855e6899abc2c670375a3ba4ac0cf652da89a70628cee1a35ae17b3490102e3c88ca324d06fce2151bc9de49472cf6e76ccb16d2a9cbf4161812e2c7758d73631024190fe9b71935de6968b289d3503b497f3f4b6306446ae9c312f8f1c63c1f7e62652173d9ed48cb128815bd44a12061f9b73fbdc6674ab9e0d01807f7bcfa0aa59168420e5ad8b72d7b576e273a1d229934fce2867689a41cb17767cf9defe1a96515a677ba08e10e187a3ce2f1d78e6b43b0d46c36163a1967b203df4f53379ee98422e973ab5c090adff21b5cc84fc78358021f681a0f0fd744f687e4f6c295470bf8f548d2d3dc841481dd51db9124cacde83bc9fef44a3e69e1cb28579d897f3013ac6133395328247fdcc152e5563678258936576196ced017c79bb6a4ea501a44cb25e5af1697afbdb3abb316837470ffdbe985ac3967334a90731602d3fac4f5c2758f04ec9c161a7cf330b7c7549fb62e6c15d07a7203c94edd3a8141c91b2029d6a90b14322337e6610822d9d7bff58c10d9c6cff71822f6456a421a65fdaa5d2c793f256a4e7a39f0d85d65fb95479eff79345c0615c9bbb4fb3324f9360b70dc709b0200042e8461b8cee9ce30beab3e276df48f41f001262fc14153f9764e13b50397442e00d7b11266bde10a3b7f83818086ff0015409679e4472d9e0215804fa9d21cebfa5cb5099cf88750cbeaaf58c2743f2746ea4cb73760ba88a07b91b68553716d563af5d7702219d0c600916dc54242d825c6d68320baf234a39f0b9ea9e6a4a72c4d5829b2f28508f54b33c7e0394a43fe23e7940d9b04bbe790d903a2d2c979e0ea79931b934d094fa2d5948c05cf278c341d788f2061ff617c9fa4700b1e1f0fbfa1b8c42848f2ea01cd318a8748c3336622ead25527ddbcd8a12ba3a5183f4419deb13558ed0ec99e73448c21ede0dbee9c01fc7675e54c60d4dee29c0f8fe81af6fe7b726f5d3c50dac634aefbf1ca6aa4df1b340a4109acf30939f6094c8591218729788111bfde98cd96d4b04b25bcd1bcb7f826241995573bae", 0x2000, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 19m29.292682431s ago: executing program 9 (id=4290): r0 = openat$sndtimer(0xffffff9c, &(0x7f0000000300), 0x82240) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x1ff, 0x40003) close_range(r1, 0xffffffffffffffff, 0x0) r2 = landlock_create_ruleset(&(0x7f00000000c0)={0xc298, 0x1, 0x3}, 0x18, 0x0) ioctl$TUNSETPERSIST(r2, 0x5450, 0x1) openat$selinux_relabel(0xffffff9c, &(0x7f0000000a80), 0x2, 0x0) r3 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r3, &(0x7f0000000040), 0x10) listen(r3, 0x0) r4 = socket(0x28, 0x5, 0xfffffffa) connect$vsock_stream(r4, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x328483, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x100, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4048800}, 0x8810) write$binfmt_elf64(r4, &(0x7f0000000240)=ANY=[], 0xffffffffffffff10) r6 = accept4$unix(r3, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000340)={0x0, 0x6, 0x322, 0x1}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000ac0)={r7, 0x1, 0xfffffffffffffff8, 0x1}) recvfrom$unix(r6, 0x0, 0x0, 0x0, 0x0, 0x0) read$watch_queue(r1, 0x0, 0x0) fstatfs(r0, &(0x7f0000000000)=""/16) 19m7.415720471s ago: executing program 9 (id=4301): r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x6) r1 = syz_clone3(&(0x7f0000000200)={0x2102440, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0, {0x29}, &(0x7f00000000c0)=""/63, 0x3f, &(0x7f0000000100)=""/138, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x58) timer_create(0x0, &(0x7f0000000280)={0x0, 0x34, 0x1, @tid=r1}, &(0x7f00000002c0)=0x0) timer_delete(r3) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000300)={0x4, 0x1000, 0x0, 0x2c7d, 0x10, "2f3658e1e1b453d9"}) r4 = openat$ttynull(0xffffff9c, &(0x7f0000000340), 0x400, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)={0xe, "0ba9dc26edf53ed4027dfc20dc70f7138ba55778354de73b5e11964eaa0aed9b6d9e63eeaf68b3606bcf95a8ecad04a56778035970e8f21b7b18d4297cf318f85a2e95b47f75c896ab2776f9d68b75adbe419454dfb4f6b84f67e80283a000402c9e86e6c5e2dde8a80f70f2e18a0b1a0d15f6de4dd8d1bc3ef8e78dead36b19fa489e437dec1ccb58181c68947e06e47b076d2a6e07d8cb2edcf41e98ed8afbfacf85aec455d4c10bd179f21bbfe2beff7d6b33b6866330b2a851869623433a6084d78adb134fdf2be2a73f43d70587a27464515472f1516d536dab9f66a06bdb46032aedbe3ed77b23b6a1ed035884162682413c5f278f615e2642b56b193c1750cf51a7f03d4a744ebf3702fd964a05fa358b789de83eec11b98f9774a99cc7acfd81f58abf28c947c9f1d240683a2d01f07aa417707e46989e72e9fbbc256f001e382fd9b5005ebad799391f2b9cd3e473c78bbec0f3cedf7dbc0feab9df064b9db357342e14b938c8c295216dcacdae4a3c2d2fcc9ff4813027c7f6877bb9d74a3a69ac32f3a1230e4b2a5b9cff7f3370040810b0dd7ab20387d13a416a159a89b6c5c1eda239177775b8d19fc3e0cf32e3e3060eff8a7773eb3d3e12c0728e29e7e4ac875c1d43883701ddce7302b7ec8b1ee892a5deba6872d32912a1992f882374adfe50d7359b976808ac87d766ddd4505e4716d07e4783524643d1"}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000005c0)) r5 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000600)={r0, 0x2, 0x27b, 0x7}) write$USERIO_CMD_SEND_INTERRUPT(r6, &(0x7f0000000640)={0x2, 0xd9}, 0x2) mq_notify(r6, &(0x7f00000016c0)={0x0, 0x31, 0x1, @thr={&(0x7f0000000680)="ab8193ed45a08f8a56e44e9c3646b00a60bdca92c270caff5a2c07fe44845ec3d2013e6f8d25508772", &(0x7f00000006c0)="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"}}) r7 = signalfd(r6, &(0x7f0000001700)={[0x4, 0x3]}, 0x8) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r7, 0xc01064c7, &(0x7f00000017c0)={0x2, 0x0, &(0x7f0000001780)=[0x0, 0x0]}) r8 = gettid() clock_gettime(0x0, &(0x7f0000001800)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) timer_settime(r3, 0x1, &(0x7f0000001880)={{r9, r10+60000000}, {r11, r12+60000000}}, &(0x7f00000018c0)) sched_setaffinity(r8, 0x8, &(0x7f0000001900)=0x7) sendto$unix(r6, &(0x7f0000001940)="ef03b987c66770ebde00ed31a8e9d9fe5687c2b344b46c1600b04f6c06a7cc69d3ce4b4c111ab27050ed7e2105fbd1d18b2c96e71d0f39ac9516c09a9202f2bba15d7e2de2dec01aad44c764ea221ff119999ea8bb8cb45fa74a7a11b854a1609b5e688fe1159aeeaa514e4ed5126e9346aaf06641b9a5ea3d7898a59e33a778e8b3c73b43fb0d", 0x87, 0x8844, &(0x7f0000001a00)=@abs={0x1, 0x0, 0x4e23}, 0x6e) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000001a80), &(0x7f0000001ac0)={'U+', 0x2}, 0x16, 0x1) timer_gettime(0x0, &(0x7f0000001b00)) sched_setparam(r2, &(0x7f0000001b40)=0x3611296) syz_open_pts(r7, 0x109400) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000001c80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001c40)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000001cc0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000001c00)=0x5, r13, 0x0, 0x0, 0x1}}, 0x20) 18m54.241791235s ago: executing program 9 (id=4303): setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0xff03, 0x3c8, 0x0, 0x0, 0x1d0, 0x2e0, 0x2e0, 0x2e0, 0x7fffffe, 0x0, {[{{@arp={@private=0xa010102, @empty, 0xff000000, 0xff000000, 0xf, 0x10, {@mac=@random="bcbb2c49c064", {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}}, {@mac=@remote, {[0x0, 0xff, 0x0, 0xff]}}, 0x9, 0xf702, 0x3, 0x3, 0x5, 0xe6d, 'netpci0\x00', 'bond_slave_1\x00', {0xff}, {0xff}, 0x0, 0xb7949a4a2a8f65ab}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}, {{@arp={@multicast1, @remote, 0xffff00, 0x0, 0x7, 0x7, {@mac=@dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}, {[0x0, 0x0, 0xff, 0xff]}}, {@empty, {[0x0, 0x0, 0x0, 0x0, 0xff]}}, 0x6, 0x9, 0x8001, 0xe, 0x2, 0x3, 'pimreg\x00', 'batadv_slave_0\x00', {0xff}, {0xff}, 0x0, 0x2}, 0xc0, 0xe8, 0x0, {0x0, 0x1e03}}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x46e, 0xfffc, 0x2}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={'\xaa\xaa\xaa\xaa\xaa', 0x20}, @mac=@local, @private=0xa010101, @local, 0x1, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.sectors\x00', 0x275a, 0x0) fcntl$lock(r0, 0x410, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x1fd}) 18m46.320369056s ago: executing program 9 (id=4304): setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x0, 0x8, 0x8, 0x0, 0x6, 0x1, 0xfffffe0001000001, 0xfa11, 0xffffffff}, 0x0) ioctl$IOMMU_IOAS_MAP$PAGES(0xffffffffffffffff, 0x3b85, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r3, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000004c0)=""/4096, 0x1e67}, {&(0x7f00000000c0)=""/250, 0x4}], 0x2, 0x0, 0xd64}}], 0x300, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="18000000", @ANYRES16=r2, @ANYBLOB="a787000000ff000000000b00000404000180"], 0x18}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 18m36.306447755s ago: executing program 8 (id=4306): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0xfffffffb}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001200210321bd70000080000007000000b1a6df41af"], 0x28}, 0x1, 0x0, 0x0, 0x200088d5}, 0x0) 18m34.523729674s ago: executing program 8 (id=4307): r0 = socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x2f) socket$inet6(0xa, 0x3, 0x28ed) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr', 0x3) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) sched_setscheduler(0x0, 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x101142, 0xeaff) lseek(0xffffffffffffffff, 0x103, 0x1) 18m15.391680661s ago: executing program 8 (id=4308): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200"], 0x50) 18m14.702358199s ago: executing program 8 (id=4309): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r0, &(0x7f0000000280)=ANY=[], 0xffdd) 18m13.142117036s ago: executing program 8 (id=4310): getdents64(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x1, 0x104) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8, 0xf32}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeea, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) 18m1.013938022s ago: executing program 40 (id=4304): setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x0, 0x8, 0x8, 0x0, 0x6, 0x1, 0xfffffe0001000001, 0xfa11, 0xffffffff}, 0x0) ioctl$IOMMU_IOAS_MAP$PAGES(0xffffffffffffffff, 0x3b85, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r3, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000004c0)=""/4096, 0x1e67}, {&(0x7f00000000c0)=""/250, 0x4}], 0x2, 0x0, 0xd64}}], 0x300, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="18000000", @ANYRES16=r2, @ANYBLOB="a787000000ff000000000b00000404000180"], 0x18}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 17m45.43224552s ago: executing program 8 (id=4312): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000bc0)={r0, 0x0, 0x0}, 0x10) syz_usb_control_io$lan78xx(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x0, &(0x7f0000000100)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1404}}}, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip6gretap0\x00'}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x82801, 0x0) dup(r2) ioctl$TCSETS(r2, 0x40045431, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r4, 0x0, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20000000}, [@call={0x85, 0x0, 0x0, 0x2e}, @printk={@lx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 17m0.368616732s ago: executing program 41 (id=4312): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000bc0)={r0, 0x0, 0x0}, 0x10) syz_usb_control_io$lan78xx(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x0, &(0x7f0000000100)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1404}}}, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ip6gretap0\x00'}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x82801, 0x0) dup(r2) ioctl$TCSETS(r2, 0x40045431, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r4, 0x0, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20000000}, [@call={0x85, 0x0, 0x0, 0x2e}, @printk={@lx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 15m50.904945213s ago: executing program 0 (id=4314): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@typedef={0x8, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x0, 0x5f, 0x61, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2d}, 0x28) 15m49.516633902s ago: executing program 0 (id=4324): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280), 0x8) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r4 = dup(r3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x13, r4, 0x2000) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x17) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x42f82, 0x0) write$binfmt_aout(r4, 0x0, 0xffffffdb) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) syz_open_dev$I2C(&(0x7f0000000000), 0x1, 0x402) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) 15m3.976421235s ago: executing program 42 (id=4324): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280), 0x8) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r4 = dup(r3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x13, r4, 0x2000) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x17) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x42f82, 0x0) write$binfmt_aout(r4, 0x0, 0xffffffdb) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) syz_open_dev$I2C(&(0x7f0000000000), 0x1, 0x402) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) 13m54.088250863s ago: executing program 1 (id=4351): setfsuid(0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x80000) openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, 0x0) recvmsg(r2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x4000000000010049) 13m52.102094636s ago: executing program 1 (id=4352): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10004893}, 0x80) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x1c, 0x8, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x10) 13m47.929601351s ago: executing program 1 (id=4353): openat$rdma_cm(0xffffff9c, &(0x7f00000006c0), 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r1, 0x0, 0xc8, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) syz_open_dev$amidi(&(0x7f0000000140), 0x2, 0x181) lsm_get_self_attr(0x66, &(0x7f0000000140)={0x0, 0x0, 0xcf, 0xaf, ""/175}, &(0x7f0000000240)=0xcf, 0x1) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@ipv4={""/10, ""/2, @broadcast}, @in=@local}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) sendmsg$unix(r4, 0x0, 0x4800) sendmmsg$inet6(r5, &(0x7f00000016c0)=[{{&(0x7f00000004c0)={0xa, 0x4e23, 0x0, @loopback, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000a00)=[@rthdr_2292={{0x28, 0x29, 0x39, {0xff, 0x2, 0x2, 0xfe, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}}}], 0x28}}], 0x1, 0x4040084) 13m11.85175811s ago: executing program 1 (id=4357): timer_create(0x0, 0x0, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xe, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x3ff}, [@ringbuf_output={{0x18, 0x5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x54}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) 13m10.462860938s ago: executing program 1 (id=4358): sched_setscheduler(0x0, 0x2, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000040)=0x3, 0x4) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x1a, &(0x7f0000000240)={0x1, 'veth0_to_team\x00'}, 0x18) syz_emit_ethernet(0xbe, &(0x7f0000000380)={@multicast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0xfd, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x24, 0x0, {0x25, 0x4, 0x0, 0x0, 0x0, 0x67, 0x0, 0x3, 0x1, 0x0, @remote, @broadcast, {[@cipso={0x86, 0x7d, 0x0, [{0x0, 0xc, "e256b28c04000000fb52"}, {0x0, 0x9, "780927675ca638"}, {0x0, 0xe, "7434954373561de584b703c8"}, {0x2, 0x9, "e706d30bd224f8"}, {0x6, 0x7, "cfa11cab1a"}, {0x0, 0x10, "c600"/14}, {0x0, 0x12, "5480ef02d612fe866447a7c27fc23110"}, {0x0, 0x12, "73bc2300ad9d19a30000000000000000"}, {0x6, 0xc, "c8f46976e79e56c7a95e"}, {0x2, 0x4, "fb3d"}]}]}}}}}}}, 0x0) 13m8.920747285s ago: executing program 1 (id=4359): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0xffffd000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e25}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) clock_settime(0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x210000000013, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}], 0x3) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) splice(r4, 0x0, r6, 0x0, 0x38f9, 0x0) fcntl$setstatus(r5, 0x4, 0x42c00) fcntl$setstatus(r5, 0x4, 0x2400) write(r3, &(0x7f0000000040), 0xffffff4a) syz_create_resource$binfmt(0x0) 12m23.639563634s ago: executing program 43 (id=4359): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0xffffd000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e25}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) clock_settime(0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x210000000013, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}], 0x3) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) splice(r4, 0x0, r6, 0x0, 0x38f9, 0x0) fcntl$setstatus(r5, 0x4, 0x42c00) fcntl$setstatus(r5, 0x4, 0x2400) write(r3, &(0x7f0000000040), 0xffffff4a) syz_create_resource$binfmt(0x0) 12m11.120970851s ago: executing program 2 (id=4377): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0xc89f, 0xc000, 0x7, 0x20002f9}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x17}, @loopback}}}], 0x20}, 0x4) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)='8', 0x1}], 0x1, 0x0, 0x0, 0x2c}, 0x4000845) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 12m10.185103004s ago: executing program 2 (id=4378): r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="680000001000370429bd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="890c020044800400480012800b0001006970366772650000380002800400120008000100", @ANYRES32, @ANYBLOB="14000700000000000000000000000000000000bb14000600200100"/38], 0x68}, 0x1, 0x0, 0x0, 0xc810}, 0x20000000) 12m8.322157309s ago: executing program 2 (id=4379): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2800000012000100254c3f000000000007000000b3d328"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 12m7.812606458s ago: executing program 2 (id=4380): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f00000000c0)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0x1c3902, 0x0) sendfile(r1, r2, 0x0, 0x2000fb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x3) 12m5.452849911s ago: executing program 2 (id=4381): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, 0x2, 0x3, 0x3, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x1c}}, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0001}]}) close_range(r1, 0xffffffffffffffff, 0x0) 12m3.250481915s ago: executing program 2 (id=4382): sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x24040084) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) 11m17.879461289s ago: executing program 44 (id=4382): sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x24040084) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) 10m10.97208774s ago: executing program 4 (id=4389): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000100), 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="05"], 0x48}, 0x1, 0x0, 0x0, 0x48850}, 0x200008c1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f0000001140)=ANY=[@ANYRES64=r0], 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x8001) 10m9.630364565s ago: executing program 4 (id=4390): r0 = syz_open_dev$sndctrl(&(0x7f0000001280), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f00000101c0)={0x0, 0x49dc1e16, 0x7, 0x0, '\x00', '\x00', '\x00', 0x0, 0x0, 0x0, 0x1000000, "b6855a32474ffa64f778ddcf29c94337"}) 10m8.476564241s ago: executing program 4 (id=4391): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/locks\x00', 0x0, 0x0) pread64(r0, &(0x7f00000002c0)=""/124, 0x7c, 0x7) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r1, 0xffffffffffffffff, 0x0) 10m7.933738031s ago: executing program 3 (id=4383): r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'pimreg1\x00', 0x1}, 0x18) 10m7.111894718s ago: executing program 4 (id=4392): ioctl$BLKGETDISKSEQ(0xffffffffffffffff, 0x80081280, 0x0) 10m6.905322339s ago: executing program 3 (id=4393): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) recvfrom$inet(r2, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) 10m5.486218239s ago: executing program 4 (id=4394): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a31000000001400078005001500070000000800124000000000050005000200000005000400000000000d000300686173683a6e6574"], 0x5c}}, 0x0) r1 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r1, 0xc0285700, &(0x7f0000000b00)={0x0, "a94c67ae02ab48229ca5fa0755813900", 0xffffffffffffffff}) ioctl$SYNC_IOC_MERGE(r2, 0xc0303e03, &(0x7f0000000780)={"d1ed39d88b0149769d94c1fb10628c46d2e681cdb9e5c1a31965c61e0df52c5e", r2}) 10m2.870424327s ago: executing program 4 (id=4395): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x71096000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r0, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum64={0x6, 0x0, 0x0, 0x13, 0x0, 0x2}]}, {0x0, [0x6f, 0x2e, 0x2e, 0x2e, 0x5f]}}, 0x0, 0x2b, 0x0, 0x1, 0x8000}, 0x28) 9m21.39360829s ago: executing program 45 (id=4393): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) recvfrom$inet(r2, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) 9m17.057306496s ago: executing program 46 (id=4395): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x71096000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r0, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum64={0x6, 0x0, 0x0, 0x13, 0x0, 0x2}]}, {0x0, [0x6f, 0x2e, 0x2e, 0x2e, 0x5f]}}, 0x0, 0x2b, 0x0, 0x1, 0x8000}, 0x28) 56.390904714s ago: executing program 6 (id=4513): openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x41, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x10, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000006380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f}}, 0x50) syz_fuse_handle_req(r0, &(0x7f000000d9c0)="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", 0x2000, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x68801, 0x0) write$binfmt_elf64(r2, 0x0, 0xffbd) 42.542948666s ago: executing program 6 (id=4519): ioctl$DRM_IOCTL_PANTHOR_VM_CREATE(0xffffffffffffffff, 0xc0106441, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_emit_ethernet(0x6a, 0x0, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x80003, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x2}, {0x0, 0x4, 0x0, 0xa78a}, 0xfffffffe, 0x0, 0x1}, {{@in=@private, 0x0, 0x33}, 0x0, @in=@rand_addr=0x64010101, 0x0, 0x2, 0x1, 0x7}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) 32.470825045s ago: executing program 6 (id=4523): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r3) sendmsg$NLBL_MGMT_C_ADDDEF(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)={0x24, r4, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}]}, 0x24}}, 0x0) 28.1540033s ago: executing program 5 (id=4529): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x800, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x770, 0x0, 0xbabd}, 0x1c) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xe0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0xfff3, 0xd064db0e491fa98f}}}, 0x24}}, 0x4044080) 27.60310678s ago: executing program 5 (id=4530): r0 = syz_io_uring_setup(0x5fce, &(0x7f0000000940)={0x0, 0x40939e, 0x1, 0xfffffffe, 0x35}, &(0x7f0000000080), &(0x7f0000000040), &(0x7f0000000000)) io_uring_register$IORING_UNREGISTER_PBUF_RING(r0, 0x17, &(0x7f0000000f40)={0x0, 0x0, 0x3}, 0x1) 26.611603337s ago: executing program 5 (id=4531): io_uring_register$IORING_REGISTER_RESTRICTIONS(0xffffffffffffffff, 0xb, &(0x7f0000000200)=[@ioring_restriction_register_op={0x0, 0x1e}], 0x1) r0 = io_uring_setup(0x472a, &(0x7f000000c480)={0x0, 0xa11f, 0x1000, 0x3, 0x12e}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 25.710979227s ago: executing program 5 (id=4532): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x1000000) r2 = userfaultfd(0x80001) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x44}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa04, &(0x7f0000000000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x0, 0x2}) 15.773002649s ago: executing program 6 (id=4533): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600722, 0x19) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000080), 0x800, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1]) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="640000000206050000000000000000000000000014000780080011408000000005001500030000000500010006000000"], 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x4040000) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001800)=ANY=[@ANYBLOB="180000002500010324bd7002ffdbdf250100"], 0x18}, 0x1, 0x0, 0x0, 0x4008}, 0x0) recvmsg(r3, 0x0, 0x2000) socket$inet_udp(0x2, 0x2, 0x0) socket(0x400000000010, 0x3, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB="3f00000006020400280012800b00010062726964676500"], 0x48}, 0x1, 0x0, 0x0, 0x4c0c0}, 0x0) 10.931490052s ago: executing program 5 (id=4534): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0xe0c81) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="dc2b44", 0x3}], 0x1) 10.021800364s ago: executing program 5 (id=4535): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind$l2tp6(0xffffffffffffffff, 0x0, 0x0) connect$unix(r1, &(0x7f0000000300)=@abs={0x0, 0x0, 0xb}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) quotactl$Q_GETNEXTQUOTA(0xffffffff80000901, 0x0, 0x0, &(0x7f0000000580)) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x201f00) 572.017628ms ago: executing program 6 (id=4536): unshare(0x20040600) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1f, 0x0, 0x0) 0s ago: executing program 6 (id=4537): sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, 0x0, 0x2000c88c) syz_usb_connect(0x5, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="120100000c9768405e0483020b9901e4020109021b000100000000090400fb0160291d000905097a63"], 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000), 0x3, 0x1) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000005c0)=0xfffffffd) write$binfmt_script(r0, &(0x7f0000002480)={'#! ', './file0', [], 0xa, "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"}, 0x1000) kernel console output (not intermixed with test programs): pc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4638.698481][ T28] audit: type=1400 audit(4638.610:51127): avc: denied { read open } for pid=28232 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4638.701011][ T28] audit: type=1400 audit(4638.610:51128): avc: denied { search } for pid=28232 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4638.703004][ T28] audit: type=1400 audit(4638.610:51129): avc: denied { search } for pid=28232 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4638.704988][ T28] audit: type=1400 audit(4638.610:51130): avc: denied { search } for pid=28232 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4638.719218][ T28] audit: type=1400 audit(4638.620:51131): avc: denied { read } for pid=28232 comm="cmp" name="resolv.conf.eth26.link" dev="tmpfs" ino=239 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4638.719870][ T28] audit: type=1400 audit(4638.620:51132): avc: denied { read open } for pid=28232 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth26.link" dev="tmpfs" ino=239 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4638.819900][ T28] audit: type=1400 audit(4638.730:51133): avc: denied { getattr } for pid=28232 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4638.834775][ T28] audit: type=1400 audit(4638.750:51134): avc: denied { getattr } for pid=28232 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth26.link" dev="tmpfs" ino=239 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4643.704360][ T28] kauditd_printk_skb: 95 callbacks suppressed [ 4643.704740][ T28] audit: type=1400 audit(4643.620:51230): avc: denied { search } for pid=28245 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4643.704981][ T28] audit: type=1400 audit(4643.620:51231): avc: denied { search } for pid=28245 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4643.705192][ T28] audit: type=1400 audit(4643.620:51232): avc: denied { search } for pid=28245 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4643.711233][ T28] audit: type=1400 audit(4643.620:51233): avc: denied { read open } for pid=28245 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4643.893212][ T28] audit: type=1400 audit(4643.810:51234): avc: denied { getattr } for pid=28245 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4643.930601][ T28] audit: type=1400 audit(4643.830:51235): avc: denied { search } for pid=28245 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4643.931180][ T28] audit: type=1400 audit(4643.830:51236): avc: denied { search } for pid=28245 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4643.931406][ T28] audit: type=1400 audit(4643.830:51237): avc: denied { search } for pid=28245 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4643.931647][ T28] audit: type=1400 audit(4643.830:51238): avc: denied { search } for pid=28245 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4643.947164][ T28] audit: type=1400 audit(4643.860:51239): avc: denied { search } for pid=28245 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4648.831563][ T28] kauditd_printk_skb: 271 callbacks suppressed [ 4648.831950][ T28] audit: type=1400 audit(4648.750:51511): avc: denied { search } for pid=28239 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4649.701876][ T28] audit: type=1400 audit(4649.620:51512): avc: denied { write } for pid=28251 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4649.705196][ T28] audit: type=1400 audit(4649.620:51513): avc: denied { write open } for pid=28251 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4649.809039][ T28] audit: type=1400 audit(4649.720:51514): avc: denied { search } for pid=28251 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4649.809453][ T28] audit: type=1400 audit(4649.730:51515): avc: denied { search } for pid=28251 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4649.809800][ T28] audit: type=1400 audit(4649.730:51516): avc: denied { search } for pid=28251 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4649.810018][ T28] audit: type=1400 audit(4649.730:51517): avc: denied { search } for pid=28251 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4650.252788][ T28] audit: type=1400 audit(4650.170:51518): avc: denied { search } for pid=28253 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4650.257338][ T28] audit: type=1400 audit(4650.170:51519): avc: denied { search } for pid=28253 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4650.263412][ T28] audit: type=1400 audit(4650.170:51520): avc: denied { search } for pid=28253 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4652.224894][T28256] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4465'. [ 4654.156195][ T28] kauditd_printk_skb: 314 callbacks suppressed [ 4654.159130][ T28] audit: type=1400 audit(4654.070:51835): avc: denied { search } for pid=28261 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4654.174004][ T28] audit: type=1400 audit(4654.090:51836): avc: denied { search } for pid=28261 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4654.174369][ T28] audit: type=1400 audit(4654.090:51837): avc: denied { search } for pid=28261 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4654.174586][ T28] audit: type=1400 audit(4654.090:51838): avc: denied { getattr } for pid=28261 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth27.dhcp" dev="tmpfs" ino=241 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4654.208882][ T28] audit: type=1400 audit(4654.120:51839): avc: denied { search } for pid=28261 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4654.210835][ T28] audit: type=1400 audit(4654.120:51840): avc: denied { search } for pid=28261 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4654.212801][ T28] audit: type=1400 audit(4654.120:51841): avc: denied { search } for pid=28261 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4654.215073][ T28] audit: type=1400 audit(4654.120:51842): avc: denied { search } for pid=28261 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4654.216916][ T28] audit: type=1400 audit(4654.120:51843): avc: denied { remove_name search } for pid=28261 comm="rm" name="resolv.conf.eth27.dhcp" dev="tmpfs" ino=241 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4654.228286][ T28] audit: type=1400 audit(4654.140:51844): avc: denied { unlink } for pid=28261 comm="rm" name="resolv.conf.eth27.dhcp" dev="tmpfs" ino=241 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4659.793561][ T28] kauditd_printk_skb: 303 callbacks suppressed [ 4659.810207][ T28] audit: type=1400 audit(4659.710:52148): avc: denied { search } for pid=28266 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4659.959221][ T28] audit: type=1400 audit(4659.860:52149): avc: denied { read } for pid=28266 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4659.968751][ T28] audit: type=1400 audit(4659.880:52150): avc: denied { read open } for pid=28266 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4659.993901][ T28] audit: type=1400 audit(4659.910:52151): avc: denied { search } for pid=28266 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4660.004313][ T28] audit: type=1400 audit(4659.910:52152): avc: denied { search } for pid=28266 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4660.006372][ T28] audit: type=1400 audit(4659.910:52153): avc: denied { search } for pid=28266 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4660.009254][ T28] audit: type=1400 audit(4659.910:52154): avc: denied { read } for pid=28266 comm="cmp" name="resolv.conf.eth27.link" dev="tmpfs" ino=242 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4660.098261][ T28] audit: type=1400 audit(4659.950:52155): avc: denied { read open } for pid=28266 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth27.link" dev="tmpfs" ino=242 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4660.172441][ T28] audit: type=1400 audit(4660.090:52156): avc: denied { getattr } for pid=28266 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4660.188651][ T28] audit: type=1400 audit(4660.090:52157): avc: denied { getattr } for pid=28266 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth27.link" dev="tmpfs" ino=242 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4664.909275][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 4664.909671][ T28] audit: type=1400 audit(4664.810:52172): avc: denied { write } for pid=28269 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4664.918291][ T28] audit: type=1400 audit(4664.830:52173): avc: denied { write open } for pid=28269 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4665.344482][ T28] audit: type=1400 audit(4665.260:52174): avc: denied { search } for pid=28269 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4665.348328][ T28] audit: type=1400 audit(4665.260:52175): avc: denied { search } for pid=28269 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4665.350498][ T28] audit: type=1400 audit(4665.260:52176): avc: denied { search } for pid=28269 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4665.352673][ T28] audit: type=1400 audit(4665.260:52177): avc: denied { search } for pid=28269 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4665.768408][ T28] audit: type=1400 audit(4665.680:52178): avc: denied { search } for pid=28270 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4665.770513][ T28] audit: type=1400 audit(4665.680:52179): avc: denied { search } for pid=28270 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4665.778546][ T28] audit: type=1400 audit(4665.680:52180): avc: denied { search } for pid=28270 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4665.781478][ T28] audit: type=1400 audit(4665.690:52181): avc: denied { read open } for pid=28270 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4670.086139][ T28] kauditd_printk_skb: 339 callbacks suppressed [ 4670.086536][ T28] audit: type=1400 audit(4670.000:52521): avc: denied { read } for pid=28277 comm="syz.5.4468" dev="nsfs" ino=4026532838 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4670.090803][ T28] audit: type=1400 audit(4670.010:52522): avc: denied { read open } for pid=28277 comm="syz.5.4468" path="net:[4026532838]" dev="nsfs" ino=4026532838 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4670.102121][ T28] audit: type=1400 audit(4670.020:52523): avc: denied { create } for pid=28277 comm="syz.5.4468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4670.112032][ T28] audit: type=1400 audit(4670.030:52524): avc: denied { create } for pid=28277 comm="syz.5.4468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4670.215852][ T28] audit: type=1400 audit(4670.130:52525): avc: denied { write } for pid=28277 comm="syz.5.4468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4670.421516][ T28] audit: type=1400 audit(4670.340:52526): avc: denied { module_request } for pid=28277 comm="syz.5.4468" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4670.700300][ T28] audit: type=1400 audit(4670.620:52527): avc: denied { ioctl } for pid=28277 comm="syz.5.4468" path="socket:[52379]" dev="sockfs" ino=52379 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4670.705063][ T28] audit: type=1400 audit(4670.620:52528): avc: denied { module_request } for pid=28277 comm="syz.5.4468" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4671.183438][ T28] audit: type=1400 audit(4671.100:52529): avc: denied { write } for pid=28277 comm="syz.5.4468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4671.949896][ T28] audit: type=1400 audit(4671.860:52530): avc: denied { search } for pid=28280 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4675.097202][ T28] kauditd_printk_skb: 144 callbacks suppressed [ 4675.097752][ T28] audit: type=1400 audit(4675.010:52675): avc: denied { read open } for pid=28288 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4675.116661][ T28] audit: type=1400 audit(4675.030:52676): avc: denied { getattr } for pid=28288 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4675.128209][ T28] audit: type=1400 audit(4675.040:52677): avc: denied { search } for pid=28288 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4675.212925][ T28] audit: type=1400 audit(4675.060:52678): avc: denied { search } for pid=28288 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4675.213233][ T28] audit: type=1400 audit(4675.130:52679): avc: denied { search } for pid=28288 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4675.213401][ T28] audit: type=1400 audit(4675.130:52680): avc: denied { search } for pid=28288 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4675.241704][ T28] audit: type=1400 audit(4675.140:52681): avc: denied { search } for pid=28288 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4675.243162][ T28] audit: type=1400 audit(4675.140:52682): avc: denied { search } for pid=28288 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4675.252448][ T28] audit: type=1400 audit(4675.140:52683): avc: denied { search } for pid=28288 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4675.252778][ T28] audit: type=1400 audit(4675.140:52684): avc: denied { read open } for pid=28288 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4680.553101][ T28] kauditd_printk_skb: 201 callbacks suppressed [ 4680.553587][ T28] audit: type=1400 audit(4680.470:52886): avc: denied { write } for pid=28296 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4680.556204][ T28] audit: type=1400 audit(4680.470:52887): avc: denied { write open } for pid=28296 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4680.623736][ T28] audit: type=1400 audit(4680.540:52888): avc: denied { search } for pid=28296 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4680.624987][ T28] audit: type=1400 audit(4680.540:52889): avc: denied { search } for pid=28296 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4680.631849][ T28] audit: type=1400 audit(4680.540:52890): avc: denied { search } for pid=28296 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4680.633156][ T28] audit: type=1400 audit(4680.540:52891): avc: denied { search } for pid=28296 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4680.809297][ T28] audit: type=1400 audit(4680.720:52892): avc: denied { search } for pid=28299 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4680.812235][ T28] audit: type=1400 audit(4680.720:52893): avc: denied { search } for pid=28299 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4680.814808][ T28] audit: type=1400 audit(4680.730:52894): avc: denied { search } for pid=28299 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4680.824527][ T28] audit: type=1400 audit(4680.730:52895): avc: denied { read open } for pid=28299 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4685.808622][ T28] kauditd_printk_skb: 320 callbacks suppressed [ 4685.809186][ T28] audit: type=1400 audit(4685.710:53216): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4685.809449][ T28] audit: type=1400 audit(4685.710:53217): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4686.029736][ T28] audit: type=1400 audit(4685.940:53218): avc: denied { recv } for pid=18973 comm="kworker/u8:16" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4686.035830][ T28] audit: type=1400 audit(4685.950:53219): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4686.060602][ T28] audit: type=1400 audit(4685.980:53220): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4686.279631][ T28] audit: type=1400 audit(4686.200:53221): avc: denied { recv } for pid=28286 comm="syz.5.4469" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4686.282620][ T28] audit: type=1400 audit(4686.200:53222): avc: denied { recv } for pid=28286 comm="syz.5.4469" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4686.399619][ T28] audit: type=1400 audit(4686.290:53223): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4686.400121][ T28] audit: type=1400 audit(4686.310:53224): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4686.602654][ T28] audit: type=1400 audit(4686.520:53225): avc: denied { search } for pid=28308 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4691.134757][T28318] netlink: 20 bytes leftover after parsing attributes in process `syz.6.4475'. [ 4691.434901][ T28] kauditd_printk_skb: 41 callbacks suppressed [ 4691.435254][ T28] audit: type=1400 audit(4691.350:53267): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4691.442431][ T28] audit: type=1400 audit(4691.350:53268): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4691.558894][ T28] audit: type=1400 audit(4691.430:53269): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4691.672481][ T28] audit: type=1400 audit(4691.530:53270): avc: denied { recv } for pid=18973 comm="kworker/u8:16" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4691.765661][ T28] audit: type=1400 audit(4691.680:53271): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4691.787069][ T28] audit: type=1400 audit(4691.700:53272): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4691.788808][ T28] audit: type=1400 audit(4691.700:53273): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4691.837162][ T28] audit: type=1400 audit(4691.750:53274): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4691.838789][ T28] audit: type=1400 audit(4691.750:53275): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4692.146234][ T28] audit: type=1400 audit(4692.060:53276): avc: denied { write } for pid=28316 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4696.441356][ T28] kauditd_printk_skb: 377 callbacks suppressed [ 4696.441815][ T28] audit: type=1400 audit(4696.360:53654): avc: denied { write open } for pid=28316 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4696.465836][ T28] audit: type=1400 audit(4696.380:53655): avc: denied { getattr } for pid=28316 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4696.469512][ T28] audit: type=1400 audit(4696.380:53656): avc: denied { ioctl } for pid=28316 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4697.345639][ T28] audit: type=1400 audit(4697.260:53657): avc: denied { search } for pid=28330 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4697.348337][ T28] audit: type=1400 audit(4697.260:53658): avc: denied { read } for pid=28330 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4697.361179][ T28] audit: type=1400 audit(4697.280:53659): avc: denied { read open } for pid=28330 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4697.368645][ T28] audit: type=1400 audit(4697.280:53660): avc: denied { search } for pid=28330 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4697.390462][ T28] audit: type=1400 audit(4697.300:53661): avc: denied { search } for pid=28330 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4697.393546][ T28] audit: type=1400 audit(4697.300:53662): avc: denied { search } for pid=28330 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4697.393677][ T28] audit: type=1400 audit(4697.300:53663): avc: denied { read } for pid=28330 comm="cmp" name="resolv.conf.eth13.ipv4ll" dev="tmpfs" ino=246 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4701.468711][ T28] kauditd_printk_skb: 65 callbacks suppressed [ 4701.469241][ T28] audit: type=1400 audit(4701.380:53729): avc: denied { search } for pid=28337 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4701.469599][ T28] audit: type=1400 audit(4701.380:53730): avc: denied { search } for pid=28337 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4701.469848][ T28] audit: type=1400 audit(4701.380:53731): avc: denied { search } for pid=28337 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4701.485352][ T28] audit: type=1400 audit(4701.400:53732): avc: denied { create } for pid=28338 comm="syz.5.4479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4701.510172][ T28] audit: type=1400 audit(4701.420:53733): avc: denied { search } for pid=28337 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4701.512636][ T28] audit: type=1400 audit(4701.420:53734): avc: denied { search } for pid=28337 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4701.512843][ T28] audit: type=1400 audit(4701.420:53735): avc: denied { search } for pid=28337 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4701.512958][ T28] audit: type=1400 audit(4701.420:53736): avc: denied { read open } for pid=28337 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4701.513062][ T28] audit: type=1400 audit(4701.420:53737): avc: denied { getattr } for pid=28337 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4701.561797][ T28] audit: type=1400 audit(4701.430:53738): avc: denied { prog_load } for pid=28338 comm="syz.5.4479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4706.429735][ C1] vcan0: j1939_tp_rxtimer: 0x86eb1a00: rx timeout, send abort [ 4706.610469][ T28] kauditd_printk_skb: 359 callbacks suppressed [ 4706.613575][ T28] audit: type=1400 audit(4706.530:54098): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4706.709687][ T28] audit: type=1400 audit(4706.630:54099): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4706.711961][ T28] audit: type=1400 audit(4706.630:54100): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4706.780642][ T28] audit: type=1400 audit(4706.630:54101): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4706.801038][ T28] audit: type=1400 audit(4706.720:54102): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4706.932648][ C1] vcan0: j1939_tp_rxtimer: 0x86eb1a00: abort rx timeout. Force session deactivation [ 4706.939247][ C1] vcan0: j1939_tp_rxtimer: 0x85c41d00: rx timeout, send abort [ 4707.039750][ T28] audit: type=1400 audit(4706.940:54103): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.041847][ T28] audit: type=1400 audit(4706.940:54104): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.044314][ T28] audit: type=1400 audit(4706.960:54105): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.057335][ T28] audit: type=1400 audit(4706.970:54106): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.088425][ T28] audit: type=1400 audit(4706.990:54107): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.444440][ C1] vcan0: j1939_tp_rxtimer: 0x85c41d00: abort rx timeout. Force session deactivation [ 4711.638261][ T28] kauditd_printk_skb: 269 callbacks suppressed [ 4711.639897][ T28] audit: type=1400 audit(4711.480:54377): avc: denied { search } for pid=28357 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4711.640143][ T28] audit: type=1400 audit(4711.550:54378): avc: denied { search } for pid=28357 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4711.640358][ T28] audit: type=1400 audit(4711.550:54379): avc: denied { search } for pid=28357 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4711.640428][ T28] audit: type=1400 audit(4711.550:54380): avc: denied { search } for pid=28357 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4711.640522][ T28] audit: type=1400 audit(4711.550:54381): avc: denied { search } for pid=28357 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4711.640581][ T28] audit: type=1400 audit(4711.550:54382): avc: denied { search } for pid=28357 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4711.662361][ T28] audit: type=1400 audit(4711.570:54383): avc: denied { read open } for pid=28357 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4711.781682][ T28] audit: type=1400 audit(4711.700:54384): avc: denied { getattr } for pid=28357 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4711.828916][ T28] audit: type=1400 audit(4711.750:54385): avc: denied { search } for pid=28357 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4711.830722][ T28] audit: type=1400 audit(4711.750:54386): avc: denied { search } for pid=28357 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4717.234538][ T28] kauditd_printk_skb: 112 callbacks suppressed [ 4717.234966][ T28] audit: type=1400 audit(4717.150:54499): avc: denied { write } for pid=28363 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4717.240202][ T28] audit: type=1400 audit(4717.160:54500): avc: denied { write open } for pid=28363 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4717.270829][ T28] audit: type=1400 audit(4717.190:54501): avc: denied { search } for pid=28363 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4717.271262][ T28] audit: type=1400 audit(4717.190:54502): avc: denied { search } for pid=28363 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4717.271471][ T28] audit: type=1400 audit(4717.190:54503): avc: denied { search } for pid=28363 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4717.271651][ T28] audit: type=1400 audit(4717.190:54504): avc: denied { search } for pid=28363 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4717.390586][ T28] audit: type=1400 audit(4717.300:54505): avc: denied { search } for pid=28364 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4717.390968][ T28] audit: type=1400 audit(4717.300:54506): avc: denied { search } for pid=28364 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4717.391261][ T28] audit: type=1400 audit(4717.300:54507): avc: denied { search } for pid=28364 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4717.391488][ T28] audit: type=1400 audit(4717.310:54508): avc: denied { read open } for pid=28364 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4723.335750][ T28] kauditd_printk_skb: 353 callbacks suppressed [ 4723.345396][ T28] audit: type=1400 audit(4723.250:54862): avc: denied { search } for pid=28366 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4723.346560][ T28] audit: type=1400 audit(4723.260:54863): avc: denied { search } for pid=28366 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4723.347017][ T28] audit: type=1400 audit(4723.260:54864): avc: denied { search } for pid=28366 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4723.362399][ T28] audit: type=1400 audit(4723.280:54865): avc: denied { getattr } for pid=28366 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth16.ipv4ll" dev="tmpfs" ino=249 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4723.418383][ T28] audit: type=1400 audit(4723.320:54866): avc: denied { search } for pid=28366 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4723.418791][ T28] audit: type=1400 audit(4723.320:54867): avc: denied { search } for pid=28366 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4723.419041][ T28] audit: type=1400 audit(4723.320:54868): avc: denied { search } for pid=28366 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4723.419248][ T28] audit: type=1400 audit(4723.320:54869): avc: denied { search } for pid=28366 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4723.419496][ T28] audit: type=1400 audit(4723.320:54870): avc: denied { remove_name search } for pid=28366 comm="rm" name="resolv.conf.eth16.ipv4ll" dev="tmpfs" ino=249 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4723.419740][ T28] audit: type=1400 audit(4723.330:54871): avc: denied { unlink } for pid=28366 comm="rm" name="resolv.conf.eth16.ipv4ll" dev="tmpfs" ino=249 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4728.995535][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 4728.996577][ T28] audit: type=1400 audit(4728.910:54880): avc: denied { write } for pid=28371 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4729.018093][ T28] audit: type=1400 audit(4728.930:54881): avc: denied { write open } for pid=28371 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4729.672867][ T28] audit: type=1400 audit(4729.590:54882): avc: denied { write } for pid=28372 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4729.676439][ T28] audit: type=1400 audit(4729.590:54883): avc: denied { write open } for pid=28372 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4730.366184][ T28] audit: type=1400 audit(4730.280:54884): avc: denied { write } for pid=28373 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4730.380053][ T28] audit: type=1400 audit(4730.300:54885): avc: denied { write open } for pid=28373 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4730.410403][ T28] audit: type=1400 audit(4730.330:54886): avc: denied { search } for pid=28373 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4730.410851][ T28] audit: type=1400 audit(4730.330:54887): avc: denied { search } for pid=28373 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4730.410979][ T28] audit: type=1400 audit(4730.330:54888): avc: denied { search } for pid=28373 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4730.411042][ T28] audit: type=1400 audit(4730.330:54889): avc: denied { search } for pid=28373 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4731.495140][T28376] ªªªªªª: renamed from vlan0 (while UP) [ 4734.199623][ T28] kauditd_printk_skb: 401 callbacks suppressed [ 4734.204305][ T28] audit: type=1400 audit(4734.110:55291): avc: denied { write } for pid=28384 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4734.210593][ T28] audit: type=1400 audit(4734.120:55292): avc: denied { write open } for pid=28384 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4734.670508][ T28] audit: type=1400 audit(4734.590:55293): avc: denied { write } for pid=28386 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4734.673269][ T28] audit: type=1400 audit(4734.590:55294): avc: denied { write open } for pid=28386 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4734.713165][ T28] audit: type=1400 audit(4734.630:55295): avc: denied { search } for pid=28386 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4734.716172][ T28] audit: type=1400 audit(4734.630:55296): avc: denied { search } for pid=28386 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4734.735238][ T28] audit: type=1400 audit(4734.630:55297): avc: denied { search } for pid=28386 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4734.739540][ T28] audit: type=1400 audit(4734.630:55298): avc: denied { search } for pid=28386 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4735.011204][ T28] audit: type=1400 audit(4734.930:55299): avc: denied { search } for pid=28387 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4735.018005][ T28] audit: type=1400 audit(4734.930:55300): avc: denied { search } for pid=28387 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4739.209067][ T28] kauditd_printk_skb: 620 callbacks suppressed [ 4739.209654][ T28] audit: type=1400 audit(4739.120:55921): avc: denied { write } for pid=28397 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4739.210032][ T28] audit: type=1400 audit(4739.120:55922): avc: denied { write open } for pid=28397 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4739.222743][ T28] audit: type=1400 audit(4739.140:55923): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4739.245756][ T28] audit: type=1400 audit(4739.160:55924): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4739.256314][ T28] audit: type=1400 audit(4739.170:55925): avc: denied { search } for pid=28397 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4739.275784][ T28] audit: type=1400 audit(4739.190:55926): avc: denied { search } for pid=28397 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4739.276751][ T28] audit: type=1400 audit(4739.190:55927): avc: denied { search } for pid=28397 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4739.285557][ T28] audit: type=1400 audit(4739.200:55928): avc: denied { search } for pid=28397 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4739.335297][ T28] audit: type=1400 audit(4739.250:55929): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4739.352613][ T28] audit: type=1400 audit(4739.270:55930): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4744.218701][ T28] kauditd_printk_skb: 926 callbacks suppressed [ 4744.230745][ T28] audit: type=1400 audit(4744.140:56857): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4744.259427][ T28] audit: type=1400 audit(4744.170:56858): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4744.278434][ T28] audit: type=1400 audit(4744.190:56859): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4744.318758][ T28] audit: type=1400 audit(4744.220:56860): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4744.319272][ T28] audit: type=1400 audit(4744.230:56861): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4744.319383][ T28] audit: type=1400 audit(4744.230:56862): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4744.348484][ T28] audit: type=1400 audit(4744.250:56863): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4744.351922][ T28] audit: type=1400 audit(4744.270:56864): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4744.358609][ T28] audit: type=1400 audit(4744.270:56865): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4744.363913][ T28] audit: type=1400 audit(4744.280:56866): avc: denied { write } for pid=28389 comm="syz.5.4486" laddr=::1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4749.235632][ T28] kauditd_printk_skb: 745 callbacks suppressed [ 4749.236061][ T28] audit: type=1400 audit(4749.150:57612): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4749.274962][ T28] audit: type=1400 audit(4749.190:57613): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4749.334176][ T28] audit: type=1400 audit(4749.240:57614): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4749.334715][ T28] audit: type=1400 audit(4749.250:57615): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4749.393869][ T28] audit: type=1400 audit(4749.310:57616): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4749.394199][ T28] audit: type=1400 audit(4749.310:57617): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4749.408636][ T28] audit: type=1400 audit(4749.320:57618): avc: denied { search } for pid=28416 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4749.419239][ T28] audit: type=1400 audit(4749.340:57619): avc: denied { search } for pid=28416 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4749.420013][ T28] audit: type=1400 audit(4749.340:57620): avc: denied { search } for pid=28416 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4749.422487][ T28] audit: type=1400 audit(4749.340:57621): avc: denied { read open } for pid=28416 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4750.212858][T28420] Device name cannot be null; rc = [-22] [ 4752.589705][T28429] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4752.590304][T28429] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4754.248996][ T28] kauditd_printk_skb: 741 callbacks suppressed [ 4754.249579][ T28] audit: type=1400 audit(2000000001.690:58363): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4754.260425][ T28] audit: type=1400 audit(2000000001.710:58364): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4754.278732][ T28] audit: type=1400 audit(2000000001.720:58365): avc: denied { search } for pid=28425 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4754.279258][ T28] audit: type=1400 audit(2000000001.720:58366): avc: denied { search } for pid=28425 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4754.279574][ T28] audit: type=1400 audit(2000000001.720:58367): avc: denied { search } for pid=28425 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4754.291020][ T28] audit: type=1400 audit(2000000001.740:58368): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4754.323059][ T28] audit: type=1400 audit(2000000001.770:58369): avc: denied { search } for pid=28425 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4754.338873][ T28] audit: type=1400 audit(2000000001.780:58370): avc: denied { search } for pid=28425 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4754.339479][ T28] audit: type=1400 audit(2000000001.780:58371): avc: denied { search } for pid=28425 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4754.339574][ T28] audit: type=1400 audit(2000000001.780:58372): avc: denied { getattr } for pid=28425 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4759.367391][ T28] kauditd_printk_skb: 446 callbacks suppressed [ 4759.369203][ T28] audit: type=1400 audit(2000000006.810:58819): avc: denied { search } for pid=28452 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4759.369448][ T28] audit: type=1400 audit(2000000006.810:58820): avc: denied { search } for pid=28452 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4759.392523][ T28] audit: type=1400 audit(2000000006.810:58821): avc: denied { search } for pid=28452 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4759.408051][ T28] audit: type=1400 audit(2000000006.840:58822): avc: denied { getattr } for pid=28452 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth12.link" dev="tmpfs" ino=256 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4759.415243][ T28] audit: type=1400 audit(2000000006.860:58823): avc: denied { search } for pid=28452 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4759.415762][ T28] audit: type=1400 audit(2000000006.860:58824): avc: denied { search } for pid=28452 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4759.415872][ T28] audit: type=1400 audit(2000000006.860:58825): avc: denied { search } for pid=28452 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4759.433345][ T28] audit: type=1400 audit(2000000006.880:58826): avc: denied { search } for pid=28452 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4759.433774][ T28] audit: type=1400 audit(2000000006.880:58827): avc: denied { remove_name search } for pid=28452 comm="rm" name="resolv.conf.eth12.link" dev="tmpfs" ino=256 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4759.458805][ T28] audit: type=1400 audit(2000000006.900:58828): avc: denied { unlink } for pid=28452 comm="rm" name="resolv.conf.eth12.link" dev="tmpfs" ino=256 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4760.535781][T28456] syz.6.4497 (28456): drop_caches: 2 [ 4764.516574][ T28] kauditd_printk_skb: 381 callbacks suppressed [ 4764.518397][ T28] audit: type=1400 audit(2000000011.950:59210): avc: denied { write } for pid=28461 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4764.520415][ T28] audit: type=1400 audit(2000000011.960:59211): avc: denied { write open } for pid=28461 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4764.591190][ T28] audit: type=1400 audit(2000000012.040:59212): avc: denied { search } for pid=28461 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4764.594204][ T28] audit: type=1400 audit(2000000012.040:59213): avc: denied { search } for pid=28461 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4764.596279][ T28] audit: type=1400 audit(2000000012.040:59214): avc: denied { search } for pid=28461 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4764.601685][ T28] audit: type=1400 audit(2000000012.040:59215): avc: denied { search } for pid=28461 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4764.855116][ T28] audit: type=1400 audit(2000000012.300:59216): avc: denied { search } for pid=28462 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4764.860085][ T28] audit: type=1400 audit(2000000012.310:59217): avc: denied { search } for pid=28462 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4764.862984][ T28] audit: type=1400 audit(2000000012.310:59218): avc: denied { search } for pid=28462 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4764.868964][ T28] audit: type=1400 audit(2000000012.320:59219): avc: denied { read open } for pid=28462 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4769.518375][ T28] kauditd_printk_skb: 396 callbacks suppressed [ 4769.518974][ T28] audit: type=1400 audit(2000000016.960:59616): avc: denied { search } for pid=28467 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4769.529479][ T28] audit: type=1400 audit(2000000016.970:59617): avc: denied { search } for pid=28467 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4769.531790][ T28] audit: type=1400 audit(2000000016.970:59618): avc: denied { search } for pid=28467 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4769.534399][ T28] audit: type=1400 audit(2000000016.970:59619): avc: denied { search } for pid=28467 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4769.558371][ T28] audit: type=1400 audit(2000000017.000:59620): avc: denied { search } for pid=28467 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4769.558893][ T28] audit: type=1400 audit(2000000017.000:59621): avc: denied { search } for pid=28467 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4769.559124][ T28] audit: type=1400 audit(2000000017.000:59622): avc: denied { search } for pid=28467 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4769.559352][ T28] audit: type=1400 audit(2000000017.000:59623): avc: denied { read open } for pid=28467 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4769.578900][ T28] audit: type=1400 audit(2000000017.020:59624): avc: denied { getattr } for pid=28467 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4769.581545][ T28] audit: type=1400 audit(2000000017.020:59625): avc: denied { search } for pid=28467 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4774.896183][ T28] kauditd_printk_skb: 324 callbacks suppressed [ 4774.908589][ T28] audit: type=1400 audit(2000000022.340:59950): avc: denied { search } for pid=28469 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4774.911764][ T28] audit: type=1400 audit(2000000022.350:59951): avc: denied { search } for pid=28469 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4774.913838][ T28] audit: type=1400 audit(2000000022.350:59952): avc: denied { search } for pid=28469 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4774.919580][ T28] audit: type=1400 audit(2000000022.370:59953): avc: denied { getattr } for pid=28469 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth14.link" dev="tmpfs" ino=259 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4774.932577][ T28] audit: type=1400 audit(2000000022.380:59954): avc: denied { search } for pid=28469 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4774.935287][ T28] audit: type=1400 audit(2000000022.380:59955): avc: denied { search } for pid=28469 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4774.939185][ T28] audit: type=1400 audit(2000000022.390:59956): avc: denied { search } for pid=28469 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4774.942295][ T28] audit: type=1400 audit(2000000022.390:59957): avc: denied { search } for pid=28469 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4774.949476][ T28] audit: type=1400 audit(2000000022.400:59958): avc: denied { remove_name search } for pid=28469 comm="rm" name="resolv.conf.eth14.link" dev="tmpfs" ino=259 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4774.955287][ T28] audit: type=1400 audit(2000000022.400:59959): avc: denied { unlink } for pid=28469 comm="rm" name="resolv.conf.eth14.link" dev="tmpfs" ino=259 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4779.903735][ T28] kauditd_printk_skb: 366 callbacks suppressed [ 4779.904248][ T28] audit: type=1400 audit(2000000027.350:60326): avc: denied { search } for pid=28471 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4780.056776][ T28] audit: type=1400 audit(2000000027.420:60327): avc: denied { getattr } for pid=28471 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4780.099549][ T28] audit: type=1400 audit(2000000027.540:60328): avc: denied { search } for pid=28471 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4780.099992][ T28] audit: type=1400 audit(2000000027.540:60329): avc: denied { search } for pid=28471 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4780.100219][ T28] audit: type=1400 audit(2000000027.540:60330): avc: denied { search } for pid=28471 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4780.100413][ T28] audit: type=1400 audit(2000000027.540:60331): avc: denied { getattr } for pid=28471 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth14.dhcp" dev="tmpfs" ino=260 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4780.123411][ T28] audit: type=1400 audit(2000000027.570:60332): avc: denied { write } for pid=28471 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4780.126495][ T28] audit: type=1400 audit(2000000027.570:60333): avc: denied { write open } for pid=28471 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4780.160248][ T28] audit: type=1400 audit(2000000027.610:60334): avc: denied { getattr } for pid=28471 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4780.163263][ T28] audit: type=1400 audit(2000000027.610:60335): avc: denied { ioctl } for pid=28471 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4784.992335][ T28] kauditd_printk_skb: 49 callbacks suppressed [ 4784.992741][ T28] audit: type=1400 audit(2000000032.430:60385): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4784.992999][ T28] audit: type=1400 audit(2000000032.440:60386): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4785.005424][ T28] audit: type=1400 audit(2000000032.450:60387): avc: denied { recv } for pid=2903 comm="syslogd" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4785.058412][ T28] audit: type=1400 audit(2000000032.500:60388): avc: denied { recv } for pid=28471 comm="dhcpcd-run-hook" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4785.058892][ T28] audit: type=1400 audit(2000000032.500:60389): avc: denied { recv } for pid=28471 comm="dhcpcd-run-hook" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4785.111781][ T28] audit: type=1400 audit(2000000032.550:60390): avc: denied { search } for pid=28471 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4785.390196][ T28] audit: type=1400 audit(2000000032.810:60391): avc: denied { execmem } for pid=28482 comm="syz.6.4500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4785.405413][ T28] audit: type=1400 audit(2000000032.850:60392): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4785.409267][ T28] audit: type=1400 audit(2000000032.850:60393): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4786.665009][ T28] audit: type=1400 audit(2000000034.110:60394): avc: denied { execmem } for pid=28485 comm="syz.5.4501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4789.999289][ T28] kauditd_printk_skb: 313 callbacks suppressed [ 4789.999888][ T28] audit: type=1400 audit(2000000037.450:60708): avc: denied { search } for pid=28484 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4790.005408][ T28] audit: type=1400 audit(2000000037.450:60709): avc: denied { search } for pid=28484 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4790.042072][ T28] audit: type=1400 audit(2000000037.490:60710): avc: denied { search } for pid=28484 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4790.059625][ T28] audit: type=1400 audit(2000000037.490:60711): avc: denied { search } for pid=28484 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4790.060300][ T28] audit: type=1400 audit(2000000037.500:60712): avc: denied { search } for pid=28484 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4790.060565][ T28] audit: type=1400 audit(2000000037.500:60713): avc: denied { getattr } for pid=28484 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4790.084421][ T28] audit: type=1400 audit(2000000037.530:60714): avc: denied { search } for pid=28484 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4790.108331][ T28] audit: type=1400 audit(2000000037.540:60715): avc: denied { search } for pid=28484 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4790.108837][ T28] audit: type=1400 audit(2000000037.540:60716): avc: denied { search } for pid=28484 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4790.109106][ T28] audit: type=1400 audit(2000000037.540:60717): avc: denied { search } for pid=28484 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4795.235641][ T28] kauditd_printk_skb: 66 callbacks suppressed [ 4795.236162][ T28] audit: type=1400 audit(2000000042.680:60784): avc: denied { write } for pid=28497 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4795.264675][ T28] audit: type=1400 audit(2000000042.710:60785): avc: denied { write open } for pid=28497 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4795.307503][ T28] audit: type=1400 audit(2000000042.750:60786): avc: denied { search } for pid=28497 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4795.319816][ T28] audit: type=1400 audit(2000000042.750:60787): avc: denied { search } for pid=28497 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4795.319996][ T28] audit: type=1400 audit(2000000042.750:60788): avc: denied { search } for pid=28497 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4795.320059][ T28] audit: type=1400 audit(2000000042.750:60789): avc: denied { search } for pid=28497 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4795.594756][ T28] audit: type=1400 audit(2000000043.040:60790): avc: denied { search } for pid=28498 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4795.595353][ T28] audit: type=1400 audit(2000000043.040:60791): avc: denied { search } for pid=28498 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4795.595783][ T28] audit: type=1400 audit(2000000043.040:60792): avc: denied { search } for pid=28498 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4795.635305][ T28] audit: type=1400 audit(2000000043.080:60793): avc: denied { read open } for pid=28498 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4800.846361][ T28] kauditd_printk_skb: 353 callbacks suppressed [ 4800.846817][ T28] audit: type=1400 audit(2000000048.290:61147): avc: denied { search } for pid=28500 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4800.882395][ T28] audit: type=1400 audit(2000000048.320:61148): avc: denied { search } for pid=28500 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4800.884552][ T28] audit: type=1400 audit(2000000048.320:61149): avc: denied { search } for pid=28500 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4800.886387][ T28] audit: type=1400 audit(2000000048.320:61150): avc: denied { getattr } for pid=28500 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth15.dhcp" dev="tmpfs" ino=262 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4800.908816][ T28] audit: type=1400 audit(2000000048.350:61151): avc: denied { search } for pid=28500 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4800.912045][ T28] audit: type=1400 audit(2000000048.360:61152): avc: denied { search } for pid=28500 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4800.914907][ T28] audit: type=1400 audit(2000000048.360:61153): avc: denied { search } for pid=28500 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4800.920541][ T28] audit: type=1400 audit(2000000048.370:61154): avc: denied { search } for pid=28500 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4801.131365][ T28] audit: type=1400 audit(2000000048.570:61155): avc: denied { remove_name search } for pid=28500 comm="rm" name="resolv.conf.eth15.dhcp" dev="tmpfs" ino=262 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4801.133817][ T28] audit: type=1400 audit(2000000048.570:61156): avc: denied { unlink } for pid=28500 comm="rm" name="resolv.conf.eth15.dhcp" dev="tmpfs" ino=262 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4805.863761][ T28] kauditd_printk_skb: 323 callbacks suppressed [ 4805.866269][ T28] audit: type=1400 audit(2000000053.310:61480): avc: denied { search } for pid=28502 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.875277][ T28] audit: type=1400 audit(2000000053.310:61481): avc: denied { search } for pid=28502 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.889615][ T28] audit: type=1400 audit(2000000053.310:61482): avc: denied { search } for pid=28502 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.908154][ T28] audit: type=1400 audit(2000000053.310:61483): avc: denied { search } for pid=28502 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.910634][ T28] audit: type=1400 audit(2000000053.320:61484): avc: denied { add_name search } for pid=28502 comm="dhcpcd-run-hook" name="resolv.conf.eth16.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4805.912995][ T28] audit: type=1400 audit(2000000053.320:61485): avc: denied { create } for pid=28502 comm="dhcpcd-run-hook" name="resolv.conf.eth16.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4805.948344][ T28] audit: type=1400 audit(2000000053.380:61486): avc: denied { write open } for pid=28502 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth16.link" dev="tmpfs" ino=263 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4806.018441][ T28] audit: type=1400 audit(2000000053.460:61487): avc: denied { search } for pid=28502 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4806.019094][ T28] audit: type=1400 audit(2000000053.460:61488): avc: denied { search } for pid=28502 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4806.019199][ T28] audit: type=1400 audit(2000000053.460:61489): avc: denied { search } for pid=28502 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.868745][ T28] kauditd_printk_skb: 96 callbacks suppressed [ 4810.869423][ T28] audit: type=1400 audit(2000000058.310:61586): avc: denied { search } for pid=28508 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.869734][ T28] audit: type=1400 audit(2000000058.310:61587): avc: denied { search } for pid=28508 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.869970][ T28] audit: type=1400 audit(2000000058.310:61588): avc: denied { search } for pid=28508 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.870456][ T28] audit: type=1400 audit(2000000058.310:61589): avc: denied { search } for pid=28508 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.870675][ T28] audit: type=1400 audit(2000000058.310:61590): avc: denied { search } for pid=28508 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.870877][ T28] audit: type=1400 audit(2000000058.310:61591): avc: denied { search } for pid=28508 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.891025][ T28] audit: type=1400 audit(2000000058.340:61592): avc: denied { read open } for pid=28508 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.908467][ T28] audit: type=1400 audit(2000000058.340:61593): avc: denied { getattr } for pid=28508 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.938337][ T28] audit: type=1400 audit(2000000058.360:61594): avc: denied { search } for pid=28508 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4810.940647][ T28] audit: type=1400 audit(2000000058.380:61595): avc: denied { search } for pid=28508 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4815.901010][ T28] kauditd_printk_skb: 324 callbacks suppressed [ 4815.901467][ T28] audit: type=1400 audit(2000000063.350:61920): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4815.920515][ T28] audit: type=1400 audit(2000000063.360:61921): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4815.943677][ T28] audit: type=1400 audit(2000000063.390:61922): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4815.978454][ T28] audit: type=1400 audit(2000000063.410:61923): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4815.998197][ T28] audit: type=1400 audit(2000000063.440:61924): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4816.048827][ T28] audit: type=1400 audit(2000000063.480:61925): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4816.049401][ T28] audit: type=1400 audit(2000000063.480:61926): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4816.088325][ T28] audit: type=1400 audit(2000000063.530:61927): avc: denied { read write } for pid=28512 comm="syz.6.4503" name="dsp" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4816.090522][ T28] audit: type=1400 audit(2000000063.530:61928): avc: denied { read write open } for pid=28512 comm="syz.6.4503" path="/dev/dsp" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4816.121785][ T28] audit: type=1400 audit(2000000063.560:61929): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4820.912157][ T28] kauditd_printk_skb: 388 callbacks suppressed [ 4820.912599][ T28] audit: type=1400 audit(2000000068.360:62318): avc: denied { search } for pid=28524 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4820.912907][ T28] audit: type=1400 audit(2000000068.360:62319): avc: denied { search } for pid=28524 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4820.913031][ T28] audit: type=1400 audit(2000000068.360:62320): avc: denied { search } for pid=28524 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4820.920364][ T28] audit: type=1400 audit(2000000068.370:62321): avc: denied { getattr } for pid=28524 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4820.931234][ T28] audit: type=1400 audit(2000000068.380:62322): avc: denied { search } for pid=28524 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4820.931739][ T28] audit: type=1400 audit(2000000068.380:62323): avc: denied { search } for pid=28524 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4820.933150][ T28] audit: type=1400 audit(2000000068.380:62324): avc: denied { search } for pid=28524 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4820.953867][ T28] audit: type=1400 audit(2000000068.390:62325): avc: denied { search } for pid=28524 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4820.954425][ T28] audit: type=1400 audit(2000000068.390:62326): avc: denied { add_name search } for pid=28524 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4820.954647][ T28] audit: type=1400 audit(2000000068.390:62327): avc: denied { read write } for pid=28538 comm="syz.5.4508" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4825.973608][ T28] kauditd_printk_skb: 112 callbacks suppressed [ 4826.008320][ T28] audit: type=1400 audit(2000000073.410:62440): avc: denied { module_request } for pid=28550 comm="syz.5.4511" kmod="crypto-cbc-camellia-asm-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4826.284476][ T28] audit: type=1400 audit(2000000073.730:62441): avc: denied { ioctl } for pid=28550 comm="syz.5.4511" path="socket:[51858]" dev="sockfs" ino=51858 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4826.373566][ T28] audit: type=1400 audit(2000000073.820:62442): avc: denied { module_request } for pid=28550 comm="syz.5.4511" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4826.437219][ T28] audit: type=1400 audit(2000000073.880:62443): avc: denied { read } for pid=28550 comm="syz.5.4511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4826.866471][ T28] audit: type=1400 audit(2000000074.310:62444): avc: denied { write } for pid=28550 comm="syz.5.4511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4827.072964][ T28] audit: type=1400 audit(2000000074.510:62445): avc: denied { sys_module } for pid=28550 comm="syz.5.4511" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4827.073428][ T28] audit: type=1400 audit(2000000074.520:62446): avc: denied { module_request } for pid=28550 comm="syz.5.4511" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4827.666815][ T28] audit: type=1400 audit(2000000075.090:62447): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4827.667280][ T28] audit: type=1400 audit(2000000075.090:62448): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4827.668253][ T28] audit: type=1400 audit(2000000075.110:62449): avc: denied { recv } for pid=28559 comm="modprobe" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4831.006122][ T28] kauditd_printk_skb: 155 callbacks suppressed [ 4831.006567][ T28] audit: type=1400 audit(2000000078.450:62605): avc: denied { search } for pid=28574 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4831.019669][ T28] audit: type=1400 audit(2000000078.460:62606): avc: denied { recv } for pid=28574 comm="dhcpcd-run-hook" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4831.106402][ T28] audit: type=1400 audit(2000000078.470:62607): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4831.127311][ T28] audit: type=1400 audit(2000000078.500:62608): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4831.129669][ T28] audit: type=1400 audit(2000000078.530:62609): avc: denied { search } for pid=28574 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4831.131514][ T28] audit: type=1400 audit(2000000078.530:62610): avc: denied { search } for pid=28574 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4831.133701][ T28] audit: type=1400 audit(2000000078.580:62611): avc: denied { read open } for pid=28574 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4831.330428][ T28] audit: type=1400 audit(2000000078.770:62612): avc: denied { getattr } for pid=28574 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4831.331091][ T28] audit: type=1400 audit(2000000078.770:62613): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4831.331207][ T28] audit: type=1400 audit(2000000078.770:62614): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4836.105487][ T28] kauditd_printk_skb: 285 callbacks suppressed [ 4836.105924][ T28] audit: type=1400 audit(2000000083.550:62900): avc: denied { search } for pid=28587 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4836.106211][ T28] audit: type=1400 audit(2000000083.550:62901): avc: denied { search } for pid=28587 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4836.106434][ T28] audit: type=1400 audit(2000000083.550:62902): avc: denied { search } for pid=28587 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4836.152922][ T28] audit: type=1400 audit(2000000083.600:62903): avc: denied { search } for pid=28572 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4836.814730][ T28] audit: type=1400 audit(2000000084.260:62904): avc: denied { read } for pid=28584 comm="syz.5.4518" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4836.818179][ T28] audit: type=1400 audit(2000000084.260:62905): avc: denied { read open } for pid=28584 comm="syz.5.4518" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4836.957083][ T28] audit: type=1400 audit(2000000084.400:62906): avc: denied { ioctl } for pid=28584 comm="syz.5.4518" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4836.984294][ T28] audit: type=1400 audit(2000000084.430:62907): avc: denied { ioctl } for pid=28584 comm="syz.5.4518" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4837.054383][ T28] audit: type=1400 audit(2000000084.500:62908): avc: denied { create } for pid=28584 comm="syz.5.4518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4837.392151][ T28] audit: type=1400 audit(2000000084.840:62909): avc: denied { write } for pid=28592 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4841.146646][ T28] kauditd_printk_skb: 401 callbacks suppressed [ 4841.147112][ T28] audit: type=1400 audit(2000000088.590:63311): avc: denied { write } for pid=28600 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4841.158532][ T28] audit: type=1400 audit(2000000088.600:63312): avc: denied { write open } for pid=28600 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4841.222051][ T28] audit: type=1400 audit(2000000088.670:63313): avc: denied { search } for pid=28600 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4841.222434][ T28] audit: type=1400 audit(2000000088.670:63314): avc: denied { search } for pid=28600 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4841.222529][ T28] audit: type=1400 audit(2000000088.670:63315): avc: denied { search } for pid=28600 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4841.222613][ T28] audit: type=1400 audit(2000000088.670:63316): avc: denied { search } for pid=28600 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4841.387251][ T28] audit: type=1400 audit(2000000088.830:63317): avc: denied { search } for pid=28601 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4841.388152][ T28] audit: type=1400 audit(2000000088.830:63318): avc: denied { search } for pid=28601 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4841.388267][ T28] audit: type=1400 audit(2000000088.830:63319): avc: denied { search } for pid=28601 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4841.396440][ T28] audit: type=1400 audit(2000000088.840:63320): avc: denied { read open } for pid=28601 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4846.150266][ T28] kauditd_printk_skb: 884 callbacks suppressed [ 4846.150685][ T28] audit: type=1400 audit(2000000093.600:64205): avc: denied { write } for pid=28603 comm="syz.6.4519" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4846.174012][ T28] audit: type=1400 audit(2000000093.620:64206): avc: denied { write } for pid=28603 comm="syz.6.4519" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4846.188462][ T28] audit: type=1400 audit(2000000093.630:64207): avc: denied { search } for pid=28611 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4846.188934][ T28] audit: type=1400 audit(2000000093.630:64208): avc: denied { search } for pid=28611 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4846.189029][ T28] audit: type=1400 audit(2000000093.630:64209): avc: denied { search } for pid=28611 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4846.189117][ T28] audit: type=1400 audit(2000000093.630:64210): avc: denied { search } for pid=28611 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4846.193849][ T28] audit: type=1400 audit(2000000093.640:64211): avc: denied { write } for pid=28603 comm="syz.6.4519" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4846.206784][ T28] audit: type=1400 audit(2000000093.650:64212): avc: denied { write } for pid=28603 comm="syz.6.4519" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4846.268513][ T28] audit: type=1400 audit(2000000093.680:64213): avc: denied { write } for pid=28603 comm="syz.6.4519" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4846.269020][ T28] audit: type=1400 audit(2000000093.710:64214): avc: denied { write } for pid=28603 comm="syz.6.4519" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4849.182266][T28620] usb usb1: usbfs: interface 0 claimed by hub while 'syz.5.4521' sets config #0 [ 4849.194759][T28620] usb usb1: usbfs: interface 0 claimed by hub while 'syz.5.4521' sets config #1 [ 4851.158856][ T28] kauditd_printk_skb: 1071 callbacks suppressed [ 4851.163518][ T28] audit: type=1400 audit(2000000098.600:65286): avc: denied { getattr } for pid=28624 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4851.169187][ T28] audit: type=1400 audit(2000000098.610:65287): avc: denied { search } for pid=28624 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4851.169606][ T28] audit: type=1400 audit(2000000098.620:65288): avc: denied { search } for pid=28624 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4851.169798][ T28] audit: type=1400 audit(2000000098.620:65289): avc: denied { search } for pid=28624 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4851.169985][ T28] audit: type=1400 audit(2000000098.620:65290): avc: denied { search } for pid=28624 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4851.179553][ T28] audit: type=1400 audit(2000000098.620:65291): avc: denied { search } for pid=28624 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4851.192354][ T28] audit: type=1400 audit(2000000098.620:65292): avc: denied { search } for pid=28624 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4851.194667][ T28] audit: type=1400 audit(2000000098.630:65293): avc: denied { search } for pid=28624 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4851.196942][ T28] audit: type=1400 audit(2000000098.630:65294): avc: denied { read open } for pid=28624 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4851.212337][ T28] audit: type=1400 audit(2000000098.630:65295): avc: denied { write } for pid=28603 comm="syz.6.4519" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4856.168640][ T28] kauditd_printk_skb: 676 callbacks suppressed [ 4856.169035][ T28] audit: type=1400 audit(2000000103.620:65972): avc: denied { search } for pid=28647 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4856.169255][ T28] audit: type=1400 audit(2000000103.620:65973): avc: denied { search } for pid=28647 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4856.169452][ T28] audit: type=1400 audit(2000000103.620:65974): avc: denied { search } for pid=28647 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4856.179284][ T28] audit: type=1400 audit(2000000103.620:65975): avc: denied { read open } for pid=28647 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4856.179597][ T28] audit: type=1400 audit(2000000103.620:65976): avc: denied { getattr } for pid=28647 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4856.179837][ T28] audit: type=1400 audit(2000000103.620:65977): avc: denied { search } for pid=28647 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4856.180046][ T28] audit: type=1400 audit(2000000103.620:65978): avc: denied { search } for pid=28647 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4856.180246][ T28] audit: type=1400 audit(2000000103.620:65979): avc: denied { search } for pid=28647 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4856.180446][ T28] audit: type=1400 audit(2000000103.620:65980): avc: denied { search } for pid=28647 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4856.180654][ T28] audit: type=1400 audit(2000000103.630:65981): avc: denied { search } for pid=28647 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4861.419495][ T28] kauditd_printk_skb: 493 callbacks suppressed [ 4861.419969][ T28] audit: type=1400 audit(2000000108.870:66475): avc: denied { search } for pid=28667 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4861.420299][ T28] audit: type=1400 audit(2000000108.870:66476): avc: denied { search } for pid=28667 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4861.420538][ T28] audit: type=1400 audit(2000000108.870:66477): avc: denied { search } for pid=28667 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4861.428527][ T28] audit: type=1400 audit(2000000108.870:66478): avc: denied { append } for pid=28667 comm="dhcpcd-run-hook" name="resolv.conf.eth21.link" dev="tmpfs" ino=272 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4861.430725][ T28] audit: type=1400 audit(2000000108.870:66479): avc: denied { append open } for pid=28667 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth21.link" dev="tmpfs" ino=272 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4861.431018][ T28] audit: type=1400 audit(2000000108.870:66480): avc: denied { search } for pid=28667 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4861.431226][ T28] audit: type=1400 audit(2000000108.870:66481): avc: denied { search } for pid=28667 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4861.431414][ T28] audit: type=1400 audit(2000000108.870:66482): avc: denied { search } for pid=28667 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4861.448204][ T28] audit: type=1400 audit(2000000108.890:66483): avc: denied { append } for pid=28667 comm="dhcpcd-run-hook" name="resolv.conf.eth21.link" dev="tmpfs" ino=272 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4861.450696][ T28] audit: type=1400 audit(2000000108.890:66484): avc: denied { append open } for pid=28667 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth21.link" dev="tmpfs" ino=272 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4866.438056][ T28] kauditd_printk_skb: 438 callbacks suppressed [ 4866.438325][ T28] audit: type=1400 audit(2000000113.880:66923): avc: denied { search } for pid=28676 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4866.438486][ T28] audit: type=1400 audit(2000000113.880:66924): avc: denied { getattr } for pid=28676 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4866.443795][ T28] audit: type=1400 audit(2000000113.890:66925): avc: denied { search } for pid=28676 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4866.444057][ T28] audit: type=1400 audit(2000000113.890:66926): avc: denied { getattr } for pid=28676 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4866.455435][ T28] audit: type=1400 audit(2000000113.900:66927): avc: denied { search } for pid=28676 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4866.457465][ T28] audit: type=1400 audit(2000000113.900:66928): avc: denied { search } for pid=28676 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4866.458238][ T28] audit: type=1400 audit(2000000113.900:66929): avc: denied { search } for pid=28676 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4866.458450][ T28] audit: type=1400 audit(2000000113.900:66930): avc: denied { getattr } for pid=28676 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth22.link" dev="tmpfs" ino=273 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4866.458653][ T28] audit: type=1400 audit(2000000113.900:66931): avc: denied { write } for pid=28676 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4866.458848][ T28] audit: type=1400 audit(2000000113.900:66932): avc: denied { write open } for pid=28676 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4871.618143][ T28] kauditd_printk_skb: 414 callbacks suppressed [ 4871.618564][ T28] audit: type=1400 audit(2000000118.960:67347): avc: denied { search } for pid=28685 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4871.618822][ T28] audit: type=1400 audit(2000000118.960:67348): avc: denied { search } for pid=28685 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4871.619032][ T28] audit: type=1400 audit(2000000118.960:67349): avc: denied { search } for pid=28685 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4871.619317][ T28] audit: type=1400 audit(2000000118.970:67350): avc: denied { search } for pid=28685 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4871.619563][ T28] audit: type=1400 audit(2000000118.970:67351): avc: denied { search } for pid=28685 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4871.619804][ T28] audit: type=1400 audit(2000000118.980:67352): avc: denied { search } for pid=28685 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4871.620022][ T28] audit: type=1400 audit(2000000118.980:67353): avc: denied { getattr } for pid=28685 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4871.620227][ T28] audit: type=1400 audit(2000000118.990:67354): avc: denied { search } for pid=28685 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4871.620420][ T28] audit: type=1400 audit(2000000118.990:67355): avc: denied { search } for pid=28685 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4871.620616][ T28] audit: type=1400 audit(2000000118.990:67356): avc: denied { search } for pid=28685 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4876.628517][ T28] kauditd_printk_skb: 499 callbacks suppressed [ 4876.639804][ T28] audit: type=1400 audit(2000000124.070:67856): avc: denied { write } for pid=28696 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4876.642791][ T28] audit: type=1400 audit(2000000124.080:67857): avc: denied { write open } for pid=28696 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4876.647308][ T28] audit: type=1400 audit(2000000124.090:67858): avc: denied { getattr } for pid=28696 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4876.668547][ T28] audit: type=1400 audit(2000000124.100:67859): avc: denied { ioctl } for pid=28696 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4877.134061][ T28] audit: type=1400 audit(2000000124.580:67860): avc: denied { search } for pid=28700 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4877.144482][ T28] audit: type=1400 audit(2000000124.580:67861): avc: denied { read } for pid=28700 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4877.153004][ T28] audit: type=1400 audit(2000000124.590:67862): avc: denied { read open } for pid=28700 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4877.158606][ T28] audit: type=1400 audit(2000000124.590:67863): avc: denied { search } for pid=28700 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4877.161614][ T28] audit: type=1400 audit(2000000124.590:67864): avc: denied { search } for pid=28700 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4877.163426][ T28] audit: type=1400 audit(2000000124.590:67865): avc: denied { search } for pid=28700 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4882.396298][ T28] kauditd_printk_skb: 35 callbacks suppressed [ 4882.396630][ T28] audit: type=1400 audit(2000000129.840:67901): avc: denied { write } for pid=28712 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4882.405004][ T28] audit: type=1400 audit(2000000129.850:67902): avc: denied { write open } for pid=28712 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4883.046218][ T28] audit: type=1400 audit(2000000130.490:67903): avc: denied { write } for pid=28713 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4883.061453][ T28] audit: type=1400 audit(2000000130.510:67904): avc: denied { write open } for pid=28713 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4883.548902][ T28] audit: type=1400 audit(2000000130.990:67905): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4883.551951][ T28] audit: type=1400 audit(2000000131.000:67906): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4883.560666][ T28] audit: type=1400 audit(2000000131.010:67907): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=50064 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4883.598701][ T28] audit: type=1400 audit(2000000131.040:67908): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=50064 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4883.604338][ T28] audit: type=1400 audit(2000000131.050:67909): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4883.618400][ T28] audit: type=1400 audit(2000000131.060:67910): avc: denied { recv } for pid=3088 comm="sshd-session" saddr=10.0.2.2 src=44560 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4884.868294][T28722] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4884.937401][T28722] misc raw-gadget: fail, usb_gadget_register_driver returned -16 ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5205:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5205:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1342:(snd_func_refer) error evaluating name ALSA lib conf.c:5205:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5728:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2722:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory ALSA lib confmisc.c:855:(parse_card) cannot find card '0' ALSA lib conf.c:5205:(_snd_config_evaluate) function snd_func_card_inum returned error: No such file or directory ALSA lib confmisc.c:422:(snd_func_concat) error evaluating strings ALSA lib conf.c:5205:(_snd_config_evaluate) function snd_func_concat returned error: No such file or directory ALSA lib confmisc.c:1342:(snd_func_refer) error evaluating name ALSA lib conf.c:5205:(_snd_config_evaluate) function snd_func_refer returned error: No such file or directory ALSA lib conf.c:5728:(snd_config_expand) Evaluate error: No such file or directory ALSA lib pcm.c:2722:(snd_pcm_open_noupdate) Unknown PCM default alsa: Could not initialize DAC alsa: Failed to open `default': alsa: Reason: No such file or directory audio: Could not create a backend for voice `lm4549.out' [ 4886.188651][T23410] ------------[ cut here ]------------ [ 4886.189222][T23410] WARNING: drivers/gpu/drm/drm_vblank.c:1320 at drm_crtc_wait_one_vblank+0x19c/0x21c, CPU#1: kworker/1:2/23410 [ 4886.191180][T23410] faux_driver vkms: [drm] vblank wait timed out on crtc 0 [ 4886.191561][T23410] Modules linked in: [ 4886.192197][T23410] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 4886.192646][T23410] CPU: 1 UID: 0 PID: 23410 Comm: kworker/1:2 Tainted: G L syzkaller #0 PREEMPT [ 4886.193349][T23410] Tainted: [L]=SOFTLOCKUP [ 4886.193856][T23410] Hardware name: ARM-Versatile Express [ 4886.194717][T23410] Workqueue: events drm_fb_helper_damage_work [ 4886.195528][T23410] Call trace: [ 4886.195972][T23410] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 4886.196930][T23410] r7:8281f9b4 r6:00000000 r5:822a8844 r4:00000001 [ 4886.197578][T23410] [<80201af0>] (show_stack) from [<8021e410>] (dump_stack_lvl+0x5c/0x70) [ 4886.198427][T23410] [<8021e3b4>] (dump_stack_lvl) from [<8021e43c>] (dump_stack+0x18/0x1c) [ 4886.199360][T23410] r7:8281f9b4 r6:00000000 r5:85a4bd40 r4:82a80d14 [ 4886.199901][T23410] [<8021e424>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 4886.200557][T23410] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 4886.201289][T23410] r7:80b3cf9c [ 4886.201604][T23410] [<80202818>] (panic) from [<80250a70>] (get_taint+0x0/0x1c) [ 4886.202137][T23410] r3:8280c544 r2:00000001 r1:8228f550 r0:82296e1c [ 4886.202558][T23410] [<802509f8>] (check_panic_on_warn) from [<80250bec>] (__warn+0x98/0x1ac) [ 4886.203289][T23410] [<80250b54>] (__warn) from [<80250ee8>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 4886.203997][T23410] r8:00000009 r7:82324454 r6:ec2c1dfc r5:85a4bd40 r4:00000000 [ 4886.204664][T23410] [<80250d04>] (warn_slowpath_fmt) from [<80b3cf9c>] (drm_crtc_wait_one_vblank+0x19c/0x21c) [ 4886.205517][T23410] r10:8418c044 r9:ffffff92 r8:00000000 r7:00047866 r6:00000000 r5:00000000 [ 4886.206185][T23410] r4:83996400 [ 4886.206498][T23410] [<80b3ce00>] (drm_crtc_wait_one_vblank) from [<80b40b84>] (drm_client_modeset_wait_for_vblank+0x60/0x74) [ 4886.207351][T23410] r10:8302ae05 r9:83996400 r8:84195a00 r7:ec2c1ec4 r6:83996400 r5:00000000 [ 4886.207996][T23410] r4:831d4040 [ 4886.208304][T23410] [<80b40b24>] (drm_client_modeset_wait_for_vblank) from [<80b5a0cc>] (drm_fb_helper_damage_work+0x80/0x1e0) [ 4886.209286][T23410] r7:ec2c1ec4 r6:84195ab8 r5:00000000 r4:84195a98 [ 4886.209823][T23410] [<80b5a04c>] (drm_fb_helper_damage_work) from [<802766b8>] (process_one_work+0x1c8/0x59c) [ 4886.210713][T23410] r9:85a4bd40 r8:01800000 r7:ddde4d80 r6:8302ae00 r5:84195a98 r4:86150380 [ 4886.211438][T23410] [<802764f0>] (process_one_work) from [<80277478>] (worker_thread+0x16c/0x318) [ 4886.212123][T23410] r10:00000000 r9:861503b0 r8:85a4bd40 r7:82804d80 r6:ddde4da0 r5:ddde4d80 [ 4886.212802][T23410] r4:86150380 [ 4886.213121][T23410] [<8027730c>] (worker_thread) from [<802814a4>] (kthread+0x11c/0x154) [ 4886.213841][T23410] r10:00000000 r9:e4415e88 r8:87209b00 r7:86150380 r6:8027730c r5:85a4bd40 [ 4886.214530][T23410] r4:872c5d00 [ 4886.214818][T23410] [<80281388>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4886.215536][T23410] Exception stack(0xec2c1fb0 to 0xec2c1ff8) [ 4886.216108][T23410] 1fa0: 00000000 00000000 00000000 00000000 [ 4886.216931][T23410] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4886.217594][T23410] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4886.218154][T23410] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281388 r4:872c5d00 [ 4890.703407][T23410] SMP: failed to stop secondary CPUs [ 4890.706265][T23410] Rebooting in 86400 seconds..