Warning: Permanently added '[localhost]:41071' (ED25519) to the list of known hosts. [ 76.990308][ T40] audit: type=1400 audit(1770670353.415:62): avc: denied { execute } for pid=5936 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 76.998990][ T40] audit: type=1400 audit(1770670353.425:63): avc: denied { execute_no_trans } for pid=5936 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/09 20:52:34 parsed 1 programs [ 78.337761][ T40] audit: type=1400 audit(1770670354.755:64): avc: denied { node_bind } for pid=5936 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 80.461648][ T40] audit: type=1400 audit(1770670356.885:65): avc: denied { mounton } for pid=5946 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 80.471975][ T40] audit: type=1400 audit(1770670356.895:66): avc: denied { mount } for pid=5946 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 80.474546][ T5946] cgroup: Unknown subsys name 'net' [ 80.485238][ T40] audit: type=1400 audit(1770670356.905:67): avc: denied { unmount } for pid=5946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 80.601917][ T5946] cgroup: Unknown subsys name 'cpuset' [ 80.607775][ T5946] cgroup: Unknown subsys name 'rlimit' [ 80.750834][ T40] audit: type=1400 audit(1770670357.175:68): avc: denied { setattr } for pid=5946 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.760489][ T40] audit: type=1400 audit(1770670357.175:69): avc: denied { create } for pid=5946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.769342][ T40] audit: type=1400 audit(1770670357.175:70): avc: denied { write } for pid=5946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.777446][ T40] audit: type=1400 audit(1770670357.175:71): avc: denied { read } for pid=5946 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.800083][ T5948] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 81.454220][ T5946] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 83.168488][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 83.168499][ T40] audit: type=1400 audit(1770670359.595:82): avc: denied { execmem } for pid=5953 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 83.232056][ T40] audit: type=1400 audit(1770670359.655:83): avc: denied { read } for pid=5954 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.238937][ T40] audit: type=1400 audit(1770670359.655:84): avc: denied { open } for pid=5954 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.246566][ T40] audit: type=1400 audit(1770670359.655:85): avc: denied { mounton } for pid=5954 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 83.305773][ T40] audit: type=1400 audit(1770670359.725:86): avc: denied { mount } for pid=5954 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 83.312855][ T40] audit: type=1400 audit(1770670359.725:87): avc: denied { mounton } for pid=5954 comm="syz-executor" path="/syzkaller.lHV2I1/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 83.320905][ T40] audit: type=1400 audit(1770670359.735:88): avc: denied { mount } for pid=5954 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 83.328326][ T40] audit: type=1400 audit(1770670359.735:89): avc: denied { mounton } for pid=5954 comm="syz-executor" path="/syzkaller.lHV2I1/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 83.336982][ T40] audit: type=1400 audit(1770670359.735:90): avc: denied { mounton } for pid=5954 comm="syz-executor" path="/syzkaller.lHV2I1/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=870 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 83.345468][ T40] audit: type=1400 audit(1770670359.735:91): avc: denied { unmount } for pid=5954 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 83.355143][ T5954] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 83.940072][ T5974] chnl_net:caif_netlink_parms(): no params data found [ 83.997471][ T5974] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.001078][ T5974] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.003944][ T5974] bridge_slave_0: entered allmulticast mode [ 84.007685][ T5974] bridge_slave_0: entered promiscuous mode [ 84.014749][ T5974] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.017877][ T5974] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.021782][ T5974] bridge_slave_1: entered allmulticast mode [ 84.025790][ T5974] bridge_slave_1: entered promiscuous mode [ 84.048745][ T5974] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.053809][ T5974] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.076917][ T5974] team0: Port device team_slave_0 added [ 84.081984][ T5974] team0: Port device team_slave_1 added [ 84.104964][ T5974] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 84.107825][ T5974] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 84.118565][ T5974] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 84.124354][ T5974] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 84.126779][ T5974] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 84.137145][ T5974] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 84.170808][ T5974] hsr_slave_0: entered promiscuous mode [ 84.174016][ T5974] hsr_slave_1: entered promiscuous mode [ 84.298624][ T5974] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 84.307063][ T5974] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 84.314033][ T5974] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 84.321369][ T5974] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 84.345358][ T5974] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.348360][ T5974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.351923][ T5974] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.354560][ T5974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.392673][ T5974] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.403882][ T1148] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.408535][ T1148] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.416982][ T5974] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.425373][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.428619][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 84.436001][ T1148] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.439132][ T1148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.546686][ T5974] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.576357][ T5974] veth0_vlan: entered promiscuous mode [ 84.582104][ T5974] veth1_vlan: entered promiscuous mode [ 84.596247][ T5974] veth0_macvtap: entered promiscuous mode [ 84.602599][ T5974] veth1_macvtap: entered promiscuous mode [ 84.611298][ T5974] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 84.617735][ T5974] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 84.624425][ T13] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.629129][ T13] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.633166][ T13] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.636281][ T13] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.711038][ T5996] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 84.714432][ T5996] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 84.721149][ T5996] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 84.723929][ T5996] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 84.726935][ T5996] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 84.747180][ T1148] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.897097][ T1148] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.975428][ T1148] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.068585][ T1148] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.849876][ T46] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 85.852426][ T46] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 85.882359][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 85.885640][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 2026/02/09 20:52:42 executed programs: 0 [ 86.474548][ T5996] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 86.478353][ T5996] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 86.481808][ T5996] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 86.485232][ T5996] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 86.489129][ T5996] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 86.591936][ T6048] chnl_net:caif_netlink_parms(): no params data found [ 86.649585][ T1030] cfg80211: failed to load regulatory.db [ 86.653063][ T6048] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.655605][ T6048] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.659987][ T6048] bridge_slave_0: entered allmulticast mode [ 86.663094][ T6048] bridge_slave_0: entered promiscuous mode [ 86.669112][ T6048] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.671364][ T6048] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.673672][ T6048] bridge_slave_1: entered allmulticast mode [ 86.676291][ T6048] bridge_slave_1: entered promiscuous mode [ 86.690926][ T6048] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.695390][ T6048] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.710082][ T6048] team0: Port device team_slave_0 added [ 86.713411][ T6048] team0: Port device team_slave_1 added [ 86.726565][ T6048] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 86.729171][ T6048] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 86.737184][ T6048] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 86.741590][ T6048] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 86.743807][ T6048] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 86.752127][ T6048] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 86.773636][ T6048] hsr_slave_0: entered promiscuous mode [ 86.775901][ T6048] hsr_slave_1: entered promiscuous mode [ 86.778060][ T6048] debugfs: 'hsr0' already exists in 'hsr' [ 86.779919][ T6048] Cannot create hsr debugfs directory [ 88.048409][ T1148] bridge_slave_1: left allmulticast mode [ 88.050304][ T1148] bridge_slave_1: left promiscuous mode [ 88.052661][ T1148] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.057346][ T1148] bridge_slave_0: left allmulticast mode [ 88.060065][ T1148] bridge_slave_0: left promiscuous mode [ 88.061944][ T1148] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.236677][ T1148] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 88.241055][ T1148] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 88.244995][ T1148] bond0 (unregistering): Released all slaves [ 88.339407][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 88.339422][ T40] audit: type=1400 audit(1770670364.765:112): avc: denied { create } for pid=6057 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 88.353243][ T40] audit: type=1400 audit(1770670364.765:113): avc: denied { write } for pid=6057 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2097 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 88.363737][ T40] audit: type=1400 audit(1770670364.765:114): avc: denied { append } for pid=6057 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2097 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 88.380765][ T40] audit: type=1400 audit(1770670364.805:115): avc: denied { unlink } for pid=6060 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2097 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 88.408624][ T1148] hsr_slave_0: left promiscuous mode [ 88.411646][ T1148] hsr_slave_1: left promiscuous mode [ 88.414186][ T1148] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 88.416551][ T1148] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 88.421798][ T1148] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 88.424306][ T1148] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 88.433539][ T1148] veth1_macvtap: left promiscuous mode [ 88.435404][ T1148] veth0_macvtap: left promiscuous mode [ 88.437181][ T1148] veth1_vlan: left promiscuous mode [ 88.440632][ T1148] veth0_vlan: left promiscuous mode [ 88.574380][ T5996] Bluetooth: hci0: command tx timeout [ 88.663027][ T1148] team0 (unregistering): Port device team_slave_1 removed [ 88.680460][ T1148] team0 (unregistering): Port device team_slave_0 removed [ 89.005082][ T6048] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 89.010038][ T6048] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 89.015175][ T6048] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 89.019229][ T6048] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 89.071665][ T6048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.080176][ T6048] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.085174][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.088393][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.097716][ T1153] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.100240][ T1153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.252475][ T6048] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 89.274971][ T6048] veth0_vlan: entered promiscuous mode [ 89.281052][ T6048] veth1_vlan: entered promiscuous mode [ 89.294551][ T6048] veth0_macvtap: entered promiscuous mode [ 89.300396][ T6048] veth1_macvtap: entered promiscuous mode [ 89.311598][ T6048] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 89.544245][ T6048] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 89.551730][ T1153] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.555366][ T1153] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.562537][ T1153] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.566314][ T1153] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.607414][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 89.611389][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 89.635020][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 89.637359][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 89.692492][ T40] audit: type=1404 audit(1770670366.115:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 89.727191][ T40] audit: type=1400 audit(1770670366.145:117): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.748045][ T40] audit: type=1400 audit(1770670366.165:118): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.760772][ T40] audit: type=1400 audit(1770670366.175:119): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.789309][ T40] audit: type=1400 audit(1770670366.215:120): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 89.799382][ T40] audit: type=1400 audit(1770670366.215:121): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 90.648133][ T5996] Bluetooth: hci0: command tx timeout [ 92.728144][ T5996] Bluetooth: hci0: command tx timeout [ 93.377163][ T40] kauditd_printk_skb: 197 callbacks suppressed [ 93.377179][ T40] audit: type=1400 audit(1770670369.795:319): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.396074][ T40] audit: type=1400 audit(1770670369.815:320): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.408117][ T40] audit: type=1400 audit(1770670369.825:321): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.439503][ T40] audit: type=1400 audit(1770670369.865:322): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.450791][ T40] audit: type=1400 audit(1770670369.875:323): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.463233][ T40] audit: type=1400 audit(1770670369.885:324): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.490012][ T40] audit: type=1400 audit(1770670369.915:325): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.501613][ T40] audit: type=1400 audit(1770670369.925:326): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.512905][ T40] audit: type=1400 audit(1770670369.935:327): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.536740][ T40] audit: type=1400 audit(1770670369.955:328): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 94.818384][ T5996] Bluetooth: hci0: command tx timeout [ 98.394854][ T40] kauditd_printk_skb: 267 callbacks suppressed [ 98.394867][ T40] audit: type=1400 audit(1770670374.815:596): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.405168][ T40] audit: type=1400 audit(1770670374.825:597): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.419762][ T40] audit: type=1400 audit(1770670374.845:598): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.448008][ T40] audit: type=1400 audit(1770670374.865:599): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.459106][ T40] audit: type=1400 audit(1770670374.885:600): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.469932][ T40] audit: type=1400 audit(1770670374.895:601): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.494910][ T40] audit: type=1400 audit(1770670374.915:602): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.503542][ T40] audit: type=1400 audit(1770670374.925:603): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.512780][ T40] audit: type=1400 audit(1770670374.935:604): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.545532][ T40] audit: type=1400 audit(1770670374.965:605): avc: denied { read write } for pid=6048 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 101.014494][ T1148] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 101.082620][ T1148] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 101.156367][ T1148] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 101.243324][ T1148] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 101.358164][ T1148] bridge_slave_1: left allmulticast mode [ 101.362924][ T1148] bridge_slave_1: left promiscuous mode [ 101.364902][ T1148] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.372054][ T1148] bridge_slave_0: left allmulticast mode [ 101.374206][ T1148] bridge_slave_0: left promiscuous mode [ 101.376187][ T1148] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.589770][ T1148] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 101.595753][ T1148] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 101.601787][ T1148] bond0 (unregistering): Released all slaves [ 102.051774][ T1148] hsr_slave_0: left promiscuous mode [ 102.054436][ T1148] hsr_slave_1: left promiscuous mode [ 102.056645][ T1148] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 102.059505][ T1148] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 102.063177][ T1148] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 102.066392][ T1148] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 102.075877][ T1148] veth1_macvtap: left promiscuous mode [ 102.078310][ T1148] veth0_macvtap: left promiscuous mode [ 102.080774][ T1148] veth1_vlan: left promiscuous mode [ 102.083084][ T1148] veth0_vlan: left promiscuous mode [ 102.304176][ T1148] team0 (unregistering): Port device team_slave_1 removed [ 102.324094][ T1148] team0 (unregistering): Port device team_slave_0 removed [ 103.398206][ T40] kauditd_printk_skb: 16472 callbacks suppressed [ 103.398223][ T40] audit: type=1400 audit(1770670379.825:17078): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.409041][ T40] audit: type=1400 audit(1770670379.825:17079): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.415958][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 103.417112][ T40] audit: type=1400 audit(1770670379.825:17080): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.419290][ T5646] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 103.419301][ T5646] audit: backlog limit exceeded [ 103.419465][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 103.427341][ T40] audit: type=1400 audit(1770670379.825:17081): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.429833][ T5646] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 103.431853][ T40] audit: type=1400 audit(1770670379.825:17082): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.408023][ T40] kauditd_printk_skb: 47001 callbacks suppressed [ 108.408036][ T40] audit: type=1400 audit(1770670384.825:61911): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.413281][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 108.418287][ T40] audit: type=1400 audit(1770670384.835:61912): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.420377][ T5646] audit: audit_lost=727 audit_rate_limit=0 audit_backlog_limit=64 [ 108.428442][ T40] audit: type=1400 audit(1770670384.835:61913): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.430827][ T5646] audit: backlog limit exceeded [ 108.437716][ T40] audit: type=1400 audit(1770670384.835:61914): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.439669][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 108.446106][ T40] audit: type=1400 audit(1770670384.835:61915): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.448120][ T5646] audit: audit_lost=728 audit_rate_limit=0 audit_backlog_limit=64 [ 113.418042][ T40] kauditd_printk_skb: 46885 callbacks suppressed [ 113.418055][ T40] audit: type=1400 audit(1770670389.835:106277): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.426807][ T40] audit: type=1400 audit(1770670389.845:106278): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.428640][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.433648][ T40] audit: type=1400 audit(1770670389.845:106279): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.435501][ T5646] audit: audit_lost=1570 audit_rate_limit=0 audit_backlog_limit=64 [ 113.442110][ T40] audit: type=1400 audit(1770670389.845:106280): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.444899][ T5646] audit: backlog limit exceeded [ 113.451485][ T40] audit: type=1400 audit(1770670389.845:106281): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.453126][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.460490][ T40] audit: type=1400 audit(1770670389.845:106282): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.428068][ T40] kauditd_printk_skb: 50010 callbacks suppressed [ 118.428081][ T40] audit: type=1400 audit(1770670394.845:153918): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.436473][ T40] audit: type=1400 audit(1770670394.855:153919): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.443133][ T40] audit: type=1400 audit(1770670394.855:153920): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.449711][ T40] audit: type=1400 audit(1770670394.855:153921): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.456420][ T40] audit: type=1400 audit(1770670394.855:153922): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.463320][ T40] audit: type=1400 audit(1770670394.855:153923): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.463509][ T5646] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.469820][ T40] audit: type=1400 audit(1770670394.855:153924): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.471871][ T5646] audit: audit_lost=2363 audit_rate_limit=0 audit_backlog_limit=64 [ 118.478425][ T40] audit: type=1400 audit(1770670394.855:153925): avc: denied { read } for pid=5646 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0