Warning: Permanently added '[localhost]:64466' (ED25519) to the list of known hosts. [ 59.038401][ T40] audit: type=1400 audit(1770456021.286:62): avc: denied { execute } for pid=5932 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 59.047704][ T40] audit: type=1400 audit(1770456021.286:63): avc: denied { execute_no_trans } for pid=5932 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/07 09:20:22 parsed 1 programs [ 60.537693][ T40] audit: type=1400 audit(1770456022.786:64): avc: denied { node_bind } for pid=5932 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 62.882347][ T40] audit: type=1400 audit(1770456025.126:65): avc: denied { mounton } for pid=5942 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 62.891946][ T40] audit: type=1400 audit(1770456025.136:66): avc: denied { mount } for pid=5942 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 62.894152][ T5942] cgroup: Unknown subsys name 'net' [ 62.903355][ T40] audit: type=1400 audit(1770456025.156:67): avc: denied { unmount } for pid=5942 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.095268][ T5942] cgroup: Unknown subsys name 'cpuset' [ 63.099867][ T5942] cgroup: Unknown subsys name 'rlimit' [ 63.257746][ T40] audit: type=1400 audit(1770456025.506:68): avc: denied { setattr } for pid=5942 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.265191][ T40] audit: type=1400 audit(1770456025.506:69): avc: denied { create } for pid=5942 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.271572][ T40] audit: type=1400 audit(1770456025.506:70): avc: denied { write } for pid=5942 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.278119][ T40] audit: type=1400 audit(1770456025.506:71): avc: denied { read } for pid=5942 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.311037][ T5944] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 63.944011][ T5942] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 65.832252][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 65.832267][ T40] audit: type=1400 audit(1770456028.076:82): avc: denied { execmem } for pid=5949 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 65.842834][ T40] audit: type=1400 audit(1770456028.086:83): avc: denied { read } for pid=5950 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 65.851674][ T40] audit: type=1400 audit(1770456028.086:84): avc: denied { open } for pid=5950 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 65.861511][ T40] audit: type=1400 audit(1770456028.086:85): avc: denied { mounton } for pid=5950 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 65.880245][ T40] audit: type=1400 audit(1770456028.126:86): avc: denied { mount } for pid=5950 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 65.887990][ T40] audit: type=1400 audit(1770456028.126:87): avc: denied { mounton } for pid=5950 comm="syz-executor" path="/syzkaller.YOmD3z/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 65.897089][ T40] audit: type=1400 audit(1770456028.126:88): avc: denied { mount } for pid=5950 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 65.904017][ T40] audit: type=1400 audit(1770456028.136:89): avc: denied { mounton } for pid=5950 comm="syz-executor" path="/syzkaller.YOmD3z/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 65.912026][ T40] audit: type=1400 audit(1770456028.136:90): avc: denied { mounton } for pid=5950 comm="syz-executor" path="/syzkaller.YOmD3z/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4989 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 65.920577][ T40] audit: type=1400 audit(1770456028.136:91): avc: denied { unmount } for pid=5950 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 65.929851][ T5950] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 66.387847][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.392694][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 66.408464][ T772] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 66.411049][ T772] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.066235][ T5993] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 67.069068][ T5993] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 67.071727][ T5993] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 67.076822][ T5993] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 67.079558][ T5993] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 67.925977][ T6015] chnl_net:caif_netlink_parms(): no params data found [ 67.992269][ T6015] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.995247][ T6015] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.997561][ T6015] bridge_slave_0: entered allmulticast mode [ 68.000198][ T6015] bridge_slave_0: entered promiscuous mode [ 68.004258][ T6015] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.006571][ T6015] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.008922][ T6015] bridge_slave_1: entered allmulticast mode [ 68.011538][ T6015] bridge_slave_1: entered promiscuous mode [ 68.026317][ T6015] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.030514][ T6015] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.047148][ T6015] team0: Port device team_slave_0 added [ 68.051866][ T6015] team0: Port device team_slave_1 added [ 68.065038][ T6015] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.067239][ T6015] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.075411][ T6015] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.080231][ T6015] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.082371][ T6015] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.090704][ T6015] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.128812][ T6015] hsr_slave_0: entered promiscuous mode [ 68.132140][ T6015] hsr_slave_1: entered promiscuous mode [ 68.266412][ T6015] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 68.273531][ T6015] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 68.277913][ T6015] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 68.282209][ T6015] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 68.345656][ T6015] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.360387][ T6015] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.367218][ T1147] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.370019][ T1147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.379230][ T1149] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.382212][ T1149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.513531][ T6015] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.548519][ T6015] veth0_vlan: entered promiscuous mode [ 68.556547][ T6015] veth1_vlan: entered promiscuous mode [ 68.578759][ T6015] veth0_macvtap: entered promiscuous mode [ 68.586087][ T6015] veth1_macvtap: entered promiscuous mode [ 68.599875][ T6015] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.606322][ T6015] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.616203][ T772] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.620518][ T772] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.623616][ T772] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.629420][ T772] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.720517][ T1147] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.826140][ T1147] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.894024][ T1147] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.994038][ T1147] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/02/07 09:20:31 executed programs: 0 [ 69.344414][ T5993] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.348659][ T5993] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.352812][ T5993] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.356476][ T5993] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.359860][ T5993] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 69.488849][ T6050] chnl_net:caif_netlink_parms(): no params data found [ 69.554889][ T6050] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.557133][ T6050] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.559364][ T6050] bridge_slave_0: entered allmulticast mode [ 69.563297][ T6050] bridge_slave_0: entered promiscuous mode [ 69.568091][ T6050] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.570791][ T6050] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.573233][ T6050] bridge_slave_1: entered allmulticast mode [ 69.575798][ T6050] bridge_slave_1: entered promiscuous mode [ 69.590849][ T6050] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.596069][ T6050] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.623367][ T6050] team0: Port device team_slave_0 added [ 69.628495][ T6050] team0: Port device team_slave_1 added [ 69.648580][ T6050] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.651066][ T6050] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 69.661391][ T6050] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.668269][ T6050] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.671231][ T6050] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 69.681977][ T6050] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.718428][ T6050] hsr_slave_0: entered promiscuous mode [ 69.721844][ T6050] hsr_slave_1: entered promiscuous mode [ 69.724899][ T6050] debugfs: 'hsr0' already exists in 'hsr' [ 69.727340][ T6050] Cannot create hsr debugfs directory [ 71.453344][ T64] Bluetooth: hci0: command tx timeout [ 71.932405][ T1147] bridge_slave_1: left allmulticast mode [ 71.935065][ T1147] bridge_slave_1: left promiscuous mode [ 71.938213][ T1147] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.945081][ T1147] bridge_slave_0: left allmulticast mode [ 71.947344][ T1147] bridge_slave_0: left promiscuous mode [ 71.949748][ T1147] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.148864][ T1147] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 72.155029][ T1147] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 72.160121][ T1147] bond0 (unregistering): Released all slaves [ 72.238345][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 72.238362][ T40] audit: type=1400 audit(1770456034.486:112): avc: denied { create } for pid=6060 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.250370][ T40] audit: type=1400 audit(1770456034.486:113): avc: denied { write } for pid=6060 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2094 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.261158][ T40] audit: type=1400 audit(1770456034.486:114): avc: denied { append } for pid=6060 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2094 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.284644][ T1147] hsr_slave_0: left promiscuous mode [ 72.287439][ T40] audit: type=1400 audit(1770456034.536:115): avc: denied { unlink } for pid=6063 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2094 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.287518][ T1147] hsr_slave_1: left promiscuous mode [ 72.298338][ T1147] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 72.301064][ T1147] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 72.307661][ T1147] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 72.309995][ T1147] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 72.318232][ T1147] veth1_macvtap: left promiscuous mode [ 72.320023][ T1147] veth0_macvtap: left promiscuous mode [ 72.322205][ T1147] veth1_vlan: left promiscuous mode [ 72.324971][ T1147] veth0_vlan: left promiscuous mode [ 72.549204][ T1147] team0 (unregistering): Port device team_slave_1 removed [ 72.565132][ T1147] team0 (unregistering): Port device team_slave_0 removed [ 73.053268][ T6050] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 73.058057][ T6050] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 73.062112][ T6050] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 73.071242][ T6050] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 73.133204][ T6050] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.141948][ T6050] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.147540][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.150538][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.168757][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.170993][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.396010][ T6050] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.416559][ T6050] veth0_vlan: entered promiscuous mode [ 73.423435][ T6050] veth1_vlan: entered promiscuous mode [ 73.444248][ T6050] veth0_macvtap: entered promiscuous mode [ 73.450449][ T6050] veth1_macvtap: entered promiscuous mode [ 73.467687][ T6050] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.476809][ T6050] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.493356][ T13] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.507275][ T13] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.511665][ T13] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.516249][ T13] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.522978][ T64] Bluetooth: hci0: command tx timeout [ 73.555669][ T772] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.558680][ T772] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.581090][ T1149] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.584514][ T1149] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.621893][ T40] audit: type=1404 audit(1770456035.866:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 73.639769][ T40] audit: type=1400 audit(1770456035.886:117): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.662716][ T40] audit: type=1400 audit(1770456035.906:118): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.670221][ T40] audit: type=1400 audit(1770456035.916:119): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.691638][ T40] audit: type=1400 audit(1770456035.936:120): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.703024][ T40] audit: type=1400 audit(1770456035.956:121): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.602650][ T64] Bluetooth: hci0: command tx timeout [ 76.486779][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.488928][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 77.243288][ T40] kauditd_printk_skb: 195 callbacks suppressed [ 77.243303][ T40] audit: type=1400 audit(1770456039.486:317): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.253522][ T40] audit: type=1400 audit(1770456039.506:318): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.284647][ T40] audit: type=1400 audit(1770456039.536:319): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.301148][ T40] audit: type=1400 audit(1770456039.546:320): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.315904][ T40] audit: type=1400 audit(1770456039.566:321): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.336654][ T40] audit: type=1400 audit(1770456039.586:322): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.356773][ T40] audit: type=1400 audit(1770456039.606:323): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.365490][ T40] audit: type=1400 audit(1770456039.616:324): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.383611][ T40] audit: type=1400 audit(1770456039.636:325): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.397050][ T40] audit: type=1400 audit(1770456039.646:326): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.693563][ T64] Bluetooth: hci0: command tx timeout [ 82.257306][ T40] kauditd_printk_skb: 268 callbacks suppressed [ 82.257319][ T40] audit: type=1400 audit(1770456044.506:595): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.282750][ T40] audit: type=1400 audit(1770456044.526:596): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.299568][ T40] audit: type=1400 audit(1770456044.546:597): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.311260][ T40] audit: type=1400 audit(1770456044.556:598): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.332890][ T40] audit: type=1400 audit(1770456044.576:599): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.344350][ T40] audit: type=1400 audit(1770456044.596:600): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.355617][ T40] audit: type=1400 audit(1770456044.606:601): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.390657][ T40] audit: type=1400 audit(1770456044.636:602): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.402147][ T40] audit: type=1400 audit(1770456044.646:603): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.416146][ T40] audit: type=1400 audit(1770456044.666:604): avc: denied { read write } for pid=6050 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 84.965791][ T1147] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.145446][ T1147] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.233503][ T1147] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.336669][ T1147] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.471889][ T1147] bridge_slave_1: left allmulticast mode [ 85.474452][ T1147] bridge_slave_1: left promiscuous mode [ 85.476927][ T1147] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.482419][ T1147] bridge_slave_0: left allmulticast mode [ 85.487219][ T1147] bridge_slave_0: left promiscuous mode [ 85.489783][ T1147] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.826684][ T1147] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 85.832242][ T1147] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 85.837345][ T1147] bond0 (unregistering): Released all slaves [ 86.176724][ T1147] hsr_slave_0: left promiscuous mode [ 86.179647][ T1147] hsr_slave_1: left promiscuous mode [ 86.181695][ T1147] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 86.184594][ T1147] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 86.187661][ T1147] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 86.190306][ T1147] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 86.197856][ T1147] veth1_macvtap: left promiscuous mode [ 86.199650][ T1147] veth0_macvtap: left promiscuous mode [ 86.201586][ T1147] veth1_vlan: left promiscuous mode [ 86.204207][ T1147] veth0_vlan: left promiscuous mode [ 86.509930][ T1147] team0 (unregistering): Port device team_slave_1 removed [ 86.539086][ T1147] team0 (unregistering): Port device team_slave_0 removed [ 86.735085][ T58] cfg80211: failed to load regulatory.db [ 87.263097][ T40] kauditd_printk_skb: 11105 callbacks suppressed [ 87.263110][ T40] audit: type=1400 audit(1770456049.506:11545): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.271759][ T40] audit: type=1400 audit(1770456049.516:11546): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.274810][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.281067][ T5646] audit: audit_lost=56 audit_rate_limit=0 audit_backlog_limit=64 [ 87.281334][ T40] audit: type=1400 audit(1770456049.516:11547): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.284284][ T5646] audit: backlog limit exceeded [ 87.291356][ T40] audit: type=1400 audit(1770456049.516:11548): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.294015][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.299904][ T40] audit: type=1400 audit(1770456049.516:11549): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.302583][ T5646] audit: audit_lost=57 audit_rate_limit=0 audit_backlog_limit=64 [ 92.272577][ T40] kauditd_printk_skb: 41733 callbacks suppressed [ 92.272590][ T40] audit: type=1400 audit(1770456054.516:53282): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.281593][ T40] audit: type=1400 audit(1770456054.526:53283): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.288577][ T40] audit: type=1400 audit(1770456054.526:53284): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.292026][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.297277][ T40] audit: type=1400 audit(1770456054.526:53285): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.299682][ T5646] audit: audit_lost=58 audit_rate_limit=0 audit_backlog_limit=64 [ 92.306861][ T40] audit: type=1400 audit(1770456054.526:53286): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.309771][ T5646] audit: backlog limit exceeded [ 92.318654][ T40] audit: type=1400 audit(1770456054.526:53287): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.321066][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.282760][ T40] kauditd_printk_skb: 40520 callbacks suppressed [ 97.282776][ T40] audit: type=1400 audit(1770456059.536:93479): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.290549][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.294147][ T40] audit: type=1400 audit(1770456059.536:93480): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.296116][ T5646] audit: audit_lost=169 audit_rate_limit=0 audit_backlog_limit=64 [ 97.305198][ T40] audit: type=1400 audit(1770456059.536:93481): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.307547][ T5646] audit: backlog limit exceeded [ 97.307826][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.319982][ T5646] audit: audit_lost=170 audit_rate_limit=0 audit_backlog_limit=64 [ 97.323466][ T5646] audit: backlog limit exceeded [ 97.323546][ T40] audit: type=1400 audit(1770456059.536:93482): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.293055][ T40] kauditd_printk_skb: 40478 callbacks suppressed [ 102.293071][ T40] audit: type=1400 audit(1770456064.546:133415): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.302502][ T40] audit: type=1400 audit(1770456064.546:133416): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.305797][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.312235][ T5646] audit: audit_lost=353 audit_rate_limit=0 audit_backlog_limit=64 [ 102.312264][ T40] audit: type=1400 audit(1770456064.546:133417): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.315626][ T5646] audit: backlog limit exceeded [ 102.316005][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.323997][ T40] audit: type=1400 audit(1770456064.546:133418): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.326131][ T5646] audit: audit_lost=354 audit_rate_limit=0 audit_backlog_limit=64 [ 102.328717][ T40] audit: type=1400 audit(1770456064.546:133419): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0