[ 53.095783][ T40] audit: type=1400 audit(1770933536.543:60): avc: denied { rlimitinh } for pid=5897 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 53.104471][ T40] audit: type=1400 audit(1770933536.543:61): avc: denied { siginh } for pid=5897 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '[localhost]:2782' (ED25519) to the list of known hosts. [ 59.757612][ T40] audit: type=1400 audit(1770933543.223:62): avc: denied { execute } for pid=5920 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 59.766713][ T40] audit: type=1400 audit(1770933543.223:63): avc: denied { execute_no_trans } for pid=5920 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/12 21:59:04 parsed 1 programs [ 61.124826][ T40] audit: type=1400 audit(1770933544.593:64): avc: denied { node_bind } for pid=5920 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 63.233285][ T40] audit: type=1400 audit(1770933546.703:65): avc: denied { mounton } for pid=5930 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.242882][ T40] audit: type=1400 audit(1770933546.713:66): avc: denied { mount } for pid=5930 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.245447][ T5930] cgroup: Unknown subsys name 'net' [ 63.253527][ T40] audit: type=1400 audit(1770933546.723:67): avc: denied { unmount } for pid=5930 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.369168][ T5930] cgroup: Unknown subsys name 'cpuset' [ 63.375476][ T5930] cgroup: Unknown subsys name 'rlimit' [ 63.532702][ T40] audit: type=1400 audit(1770933547.003:68): avc: denied { setattr } for pid=5930 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.540714][ T40] audit: type=1400 audit(1770933547.003:69): avc: denied { create } for pid=5930 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.547142][ T40] audit: type=1400 audit(1770933547.003:70): avc: denied { write } for pid=5930 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.555449][ T40] audit: type=1400 audit(1770933547.003:71): avc: denied { read } for pid=5930 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.595888][ T5933] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 64.292075][ T5930] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 66.064796][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 66.064808][ T40] audit: type=1400 audit(1770933549.533:82): avc: denied { execmem } for pid=5937 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 66.073991][ T40] audit: type=1400 audit(1770933549.533:83): avc: denied { read } for pid=5938 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.080712][ T40] audit: type=1400 audit(1770933549.533:84): avc: denied { open } for pid=5938 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.089165][ T40] audit: type=1400 audit(1770933549.533:85): avc: denied { mounton } for pid=5938 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 66.147986][ T40] audit: type=1400 audit(1770933549.613:86): avc: denied { mount } for pid=5938 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 66.157541][ T40] audit: type=1400 audit(1770933549.613:87): avc: denied { mounton } for pid=5938 comm="syz-executor" path="/syzkaller.7CIwND/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 66.167727][ T40] audit: type=1400 audit(1770933549.613:88): avc: denied { mount } for pid=5938 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 66.177098][ T40] audit: type=1400 audit(1770933549.623:89): avc: denied { mounton } for pid=5938 comm="syz-executor" path="/syzkaller.7CIwND/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 66.188544][ T40] audit: type=1400 audit(1770933549.623:90): avc: denied { mounton } for pid=5938 comm="syz-executor" path="/syzkaller.7CIwND/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=8216 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 66.200098][ T40] audit: type=1400 audit(1770933549.633:91): avc: denied { unmount } for pid=5938 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 66.214868][ T5938] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 67.855507][ T5989] chnl_net:caif_netlink_parms(): no params data found [ 67.926839][ T5989] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.929319][ T5989] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.933492][ T5989] bridge_slave_0: entered allmulticast mode [ 67.936787][ T5989] bridge_slave_0: entered promiscuous mode [ 67.941922][ T5989] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.944980][ T5989] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.948203][ T5989] bridge_slave_1: entered allmulticast mode [ 67.951901][ T5989] bridge_slave_1: entered promiscuous mode [ 67.970256][ T5989] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.975934][ T5989] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.995358][ T5989] team0: Port device team_slave_0 added [ 67.999086][ T5989] team0: Port device team_slave_1 added [ 68.015779][ T5989] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.019124][ T5989] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.028639][ T5989] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.060475][ T5989] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.064066][ T5989] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.075630][ T5989] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.130411][ T5989] hsr_slave_0: entered promiscuous mode [ 68.137374][ T5989] hsr_slave_1: entered promiscuous mode [ 68.300987][ T5989] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 68.309966][ T5989] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 68.317011][ T5989] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 68.323025][ T5989] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 68.378713][ T5989] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.394732][ T5989] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.401357][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.403870][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.410108][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.413120][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.538158][ T5989] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.581264][ T5989] veth0_vlan: entered promiscuous mode [ 68.589839][ T5989] veth1_vlan: entered promiscuous mode [ 68.605845][ T5989] veth0_macvtap: entered promiscuous mode [ 68.609847][ T5989] veth1_macvtap: entered promiscuous mode [ 68.618485][ T5989] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.624373][ T5989] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.630600][ T46] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.635076][ T46] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.638070][ T46] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.641421][ T46] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.733936][ T209] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.797728][ T209] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.864844][ T209] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.938384][ T209] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.976742][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.980935][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.002274][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.005036][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.064571][ T6027] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.068606][ T6027] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.071455][ T6027] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.074842][ T6027] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.077529][ T6027] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 2026/02/12 21:59:13 executed programs: 0 [ 69.567207][ T63] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.570741][ T63] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.574630][ T63] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.577823][ T63] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.581036][ T63] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 69.680307][ T6037] chnl_net:caif_netlink_parms(): no params data found [ 69.736313][ T6037] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.739086][ T6037] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.741952][ T6037] bridge_slave_0: entered allmulticast mode [ 69.744874][ T6037] bridge_slave_0: entered promiscuous mode [ 69.748295][ T6037] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.751235][ T6037] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.754181][ T6037] bridge_slave_1: entered allmulticast mode [ 69.756930][ T6037] bridge_slave_1: entered promiscuous mode [ 69.775492][ T6037] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.780371][ T6037] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.795195][ T6037] team0: Port device team_slave_0 added [ 69.799827][ T6037] team0: Port device team_slave_1 added [ 69.822951][ T6037] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.825739][ T6037] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 69.836813][ T6037] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.841107][ T6037] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.843442][ T6037] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 69.851723][ T6037] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.875431][ T6037] hsr_slave_0: entered promiscuous mode [ 69.877690][ T6037] hsr_slave_1: entered promiscuous mode [ 69.879741][ T6037] debugfs: 'hsr0' already exists in 'hsr' [ 69.881816][ T6037] Cannot create hsr debugfs directory [ 71.602564][ T6027] Bluetooth: hci0: command tx timeout [ 72.113361][ T209] bridge_slave_1: left allmulticast mode [ 72.115548][ T209] bridge_slave_1: left promiscuous mode [ 72.117998][ T209] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.123561][ T209] bridge_slave_0: left allmulticast mode [ 72.125551][ T209] bridge_slave_0: left promiscuous mode [ 72.127557][ T209] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.285357][ T209] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 72.289425][ T209] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 72.293180][ T209] bond0 (unregistering): Released all slaves [ 72.385122][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 72.385137][ T40] audit: type=1400 audit(1770933555.853:112): avc: denied { create } for pid=6050 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.401773][ T40] audit: type=1400 audit(1770933555.853:113): avc: denied { write } for pid=6050 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2103 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.410491][ T40] audit: type=1400 audit(1770933555.853:114): avc: denied { append } for pid=6050 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2103 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.450258][ T40] audit: type=1400 audit(1770933555.913:115): avc: denied { unlink } for pid=6053 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2103 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.473710][ T209] hsr_slave_0: left promiscuous mode [ 72.476748][ T209] hsr_slave_1: left promiscuous mode [ 72.479654][ T209] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 72.483162][ T209] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 72.487165][ T209] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 72.490223][ T209] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 72.498836][ T209] veth1_macvtap: left promiscuous mode [ 72.501224][ T209] veth0_macvtap: left promiscuous mode [ 72.503659][ T209] veth1_vlan: left promiscuous mode [ 72.505871][ T209] veth0_vlan: left promiscuous mode [ 72.680388][ T209] team0 (unregistering): Port device team_slave_1 removed [ 72.686881][ T209] team0 (unregistering): Port device team_slave_0 removed [ 73.230264][ T6037] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 73.236970][ T6037] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 73.240815][ T6037] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 73.246595][ T6037] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 73.288313][ T6037] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.296494][ T6037] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.302510][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.305012][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.311511][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.314590][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.542705][ T6037] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.576060][ T6037] veth0_vlan: entered promiscuous mode [ 73.587349][ T6037] veth1_vlan: entered promiscuous mode [ 73.621577][ T6037] veth0_macvtap: entered promiscuous mode [ 73.625750][ T6037] veth1_macvtap: entered promiscuous mode [ 73.633601][ T6037] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.639179][ T6037] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.646067][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.648709][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.653648][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.656212][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.682176][ T6027] Bluetooth: hci0: command tx timeout [ 73.687510][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.690529][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.719949][ T46] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.723816][ T46] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.749592][ T40] audit: type=1404 audit(1770933557.213:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 73.766545][ T40] audit: type=1400 audit(1770933557.233:117): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.780716][ T40] audit: type=1400 audit(1770933557.243:118): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.789751][ T40] audit: type=1400 audit(1770933557.253:119): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.830369][ T40] audit: type=1400 audit(1770933557.293:120): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.843533][ T40] audit: type=1400 audit(1770933557.313:121): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.761900][ T6027] Bluetooth: hci0: command tx timeout [ 76.338727][ T1418] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.340959][ T1418] ieee802154 phy1 wpan1: encryption failed: -22 [ 77.409519][ T40] kauditd_printk_skb: 194 callbacks suppressed [ 77.409531][ T40] audit: type=1400 audit(1770933560.873:316): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.424429][ T40] audit: type=1400 audit(1770933560.893:317): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.433665][ T40] audit: type=1400 audit(1770933560.903:318): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.461397][ T40] audit: type=1400 audit(1770933560.923:319): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.475552][ T40] audit: type=1400 audit(1770933560.943:320): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.496579][ T40] audit: type=1400 audit(1770933560.963:321): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.523906][ T40] audit: type=1400 audit(1770933560.993:322): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.544440][ T40] audit: type=1400 audit(1770933561.013:323): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.556477][ T40] audit: type=1400 audit(1770933561.023:324): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.572783][ T40] audit: type=1400 audit(1770933561.043:325): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.851835][ T6027] Bluetooth: hci0: command tx timeout [ 82.429981][ T40] kauditd_printk_skb: 261 callbacks suppressed [ 82.429999][ T40] audit: type=1400 audit(1770933565.893:587): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.441394][ T40] audit: type=1400 audit(1770933565.903:588): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.451217][ T40] audit: type=1400 audit(1770933565.913:589): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.481455][ T40] audit: type=1400 audit(1770933565.943:590): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.498722][ T40] audit: type=1400 audit(1770933565.963:591): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.510267][ T40] audit: type=1400 audit(1770933565.973:592): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.533237][ T40] audit: type=1400 audit(1770933566.003:593): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.546455][ T40] audit: type=1400 audit(1770933566.013:594): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.563956][ T40] audit: type=1400 audit(1770933566.033:595): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.581171][ T40] audit: type=1400 audit(1770933566.043:596): avc: denied { read write } for pid=6037 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 85.167112][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.245246][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.321198][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.377088][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.506262][ T12] bridge_slave_1: left allmulticast mode [ 85.508140][ T12] bridge_slave_1: left promiscuous mode [ 85.510300][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.517391][ T12] bridge_slave_0: left allmulticast mode [ 85.519188][ T12] bridge_slave_0: left promiscuous mode [ 85.521081][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.701907][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 85.706558][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 85.711485][ T12] bond0 (unregistering): Released all slaves [ 86.034549][ T12] hsr_slave_0: left promiscuous mode [ 86.036670][ T12] hsr_slave_1: left promiscuous mode [ 86.038659][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 86.041034][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 86.045390][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 86.048574][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 86.057038][ T12] veth1_macvtap: left promiscuous mode [ 86.059395][ T12] veth0_macvtap: left promiscuous mode [ 86.061885][ T12] veth1_vlan: left promiscuous mode [ 86.064123][ T12] veth0_vlan: left promiscuous mode [ 86.205430][ T12] team0 (unregistering): Port device team_slave_1 removed [ 86.212570][ T12] team0 (unregistering): Port device team_slave_0 removed [ 87.431820][ T40] kauditd_printk_skb: 14286 callbacks suppressed [ 87.431839][ T40] audit: type=1400 audit(1770933570.903:14883): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.443938][ T40] audit: type=1400 audit(1770933570.903:14884): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.451346][ T40] audit: type=1400 audit(1770933570.903:14885): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.461970][ T40] audit: type=1400 audit(1770933570.903:14886): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.470784][ T40] audit: type=1400 audit(1770933570.903:14887): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.477884][ T40] audit: type=1400 audit(1770933570.903:14888): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.479603][ T5634] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.484768][ T40] audit: type=1400 audit(1770933570.903:14889): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.486938][ T5634] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 87.494086][ T40] audit: type=1400 audit(1770933570.903:14890): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 91.691307][ T828] cfg80211: failed to load regulatory.db [ 92.441675][ T40] kauditd_printk_skb: 45767 callbacks suppressed [ 92.441692][ T40] audit: type=1400 audit(1770933575.903:59943): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.447271][ T5634] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.453387][ T40] audit: type=1400 audit(1770933575.913:59944): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.455173][ T5634] audit: audit_lost=240 audit_rate_limit=0 audit_backlog_limit=64 [ 92.461194][ T40] audit: type=1400 audit(1770933575.913:59945): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.463672][ T5634] audit: backlog limit exceeded [ 92.463934][ T5634] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.469630][ T40] audit: type=1400 audit(1770933575.913:59946): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.471202][ T5634] audit: audit_lost=241 audit_rate_limit=0 audit_backlog_limit=64 [ 92.471213][ T5634] audit: backlog limit exceeded [ 97.451779][ T40] kauditd_printk_skb: 42867 callbacks suppressed [ 97.451791][ T40] audit: type=1400 audit(1770933580.913:101893): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.457824][ T5634] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.460732][ T40] audit: type=1400 audit(1770933580.923:101894): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.463297][ T5634] audit: audit_lost=549 audit_rate_limit=0 audit_backlog_limit=64 [ 97.470240][ T40] audit: type=1400 audit(1770933580.923:101895): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.472606][ T5634] audit: backlog limit exceeded [ 97.479913][ T40] audit: type=1400 audit(1770933580.923:101896): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.481991][ T5634] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.490380][ T40] audit: type=1400 audit(1770933580.923:101897): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.492311][ T5634] audit: audit_lost=550 audit_rate_limit=0 audit_backlog_limit=64 [ 102.461700][ T40] kauditd_printk_skb: 45274 callbacks suppressed [ 102.461713][ T40] audit: type=1400 audit(1770933585.923:146529): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.470119][ T5634] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.470372][ T40] audit: type=1400 audit(1770933585.933:146530): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.472470][ T5634] audit: audit_lost=765 audit_rate_limit=0 audit_backlog_limit=64 [ 102.472483][ T5634] audit: backlog limit exceeded [ 102.472608][ T5634] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.479584][ T40] audit: type=1400 audit(1770933585.933:146531): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.482726][ T5634] audit: audit_lost=766 audit_rate_limit=0 audit_backlog_limit=64 [ 102.482743][ T5634] audit: backlog limit exceeded [ 102.484299][ T40] audit: type=1400 audit(1770933585.933:146532): avc: denied { read } for pid=5634 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0