[ 86.507910][ T871] cfg80211: failed to load regulatory.db Warning: Permanently added '[localhost]:54656' (ED25519) to the list of known hosts. [ 90.976126][ T40] audit: type=1400 audit(1770158070.685:62): avc: denied { execute } for pid=5945 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 90.985127][ T40] audit: type=1400 audit(1770158070.695:63): avc: denied { execute_no_trans } for pid=5945 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/03 22:34:31 parsed 1 programs [ 92.259632][ T40] audit: type=1400 audit(1770158071.975:64): avc: denied { node_bind } for pid=5945 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 92.266965][ T40] audit: type=1400 audit(1770158071.975:65): avc: denied { node_bind } for pid=5945 comm="syz-execprog" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 94.213116][ T40] audit: type=1400 audit(1770158073.925:66): avc: denied { mounton } for pid=5954 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 94.223075][ T40] audit: type=1400 audit(1770158073.935:67): avc: denied { mount } for pid=5954 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 94.224783][ T5954] cgroup: Unknown subsys name 'net' [ 94.236020][ T40] audit: type=1400 audit(1770158073.955:68): avc: denied { unmount } for pid=5954 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 94.429730][ T5954] cgroup: Unknown subsys name 'cpuset' [ 94.433682][ T5954] cgroup: Unknown subsys name 'rlimit' [ 94.678485][ T40] audit: type=1400 audit(1770158074.395:69): avc: denied { setattr } for pid=5954 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 94.685619][ T40] audit: type=1400 audit(1770158074.395:70): avc: denied { create } for pid=5954 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 94.692981][ T40] audit: type=1400 audit(1770158074.395:71): avc: denied { write } for pid=5954 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 94.731113][ T5960] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 95.394231][ T5954] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 97.120236][ T40] kauditd_printk_skb: 11 callbacks suppressed [ 97.120249][ T40] audit: type=1400 audit(1770158076.835:83): avc: denied { execmem } for pid=5961 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 97.128860][ T40] audit: type=1400 audit(1770158076.835:84): avc: denied { read } for pid=5962 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 97.135926][ T40] audit: type=1400 audit(1770158076.835:85): avc: denied { open } for pid=5962 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 97.144047][ T40] audit: type=1400 audit(1770158076.845:86): avc: denied { mounton } for pid=5962 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 97.183903][ T40] audit: type=1400 audit(1770158076.895:87): avc: denied { mount } for pid=5962 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 97.191375][ T40] audit: type=1400 audit(1770158076.895:88): avc: denied { mounton } for pid=5962 comm="syz-executor" path="/syzkaller.FqhF34/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 97.199833][ T40] audit: type=1400 audit(1770158076.895:89): avc: denied { mount } for pid=5962 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 97.207040][ T40] audit: type=1400 audit(1770158076.905:90): avc: denied { mounton } for pid=5962 comm="syz-executor" path="/syzkaller.FqhF34/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 97.215858][ T40] audit: type=1400 audit(1770158076.905:91): avc: denied { mounton } for pid=5962 comm="syz-executor" path="/syzkaller.FqhF34/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 97.224965][ T40] audit: type=1400 audit(1770158076.905:92): avc: denied { unmount } for pid=5962 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 97.234780][ T5962] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 97.300060][ T5969] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 97.304025][ T5969] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 97.308442][ T5969] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 97.312287][ T5969] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 97.315379][ T5969] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 97.521860][ T1150] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.525313][ T1150] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 97.542315][ T1150] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 97.545644][ T1150] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 99.164663][ T6031] chnl_net:caif_netlink_parms(): no params data found [ 99.204759][ T6031] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.207629][ T6031] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.209944][ T6031] bridge_slave_0: entered allmulticast mode [ 99.212533][ T6031] bridge_slave_0: entered promiscuous mode [ 99.216484][ T6031] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.218772][ T6031] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.221048][ T6031] bridge_slave_1: entered allmulticast mode [ 99.223806][ T6031] bridge_slave_1: entered promiscuous mode [ 99.238565][ T6031] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 99.244230][ T6031] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 99.261554][ T6031] team0: Port device team_slave_0 added [ 99.268256][ T6031] team0: Port device team_slave_1 added [ 99.282145][ T6031] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 99.284840][ T6031] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 99.294889][ T6031] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 99.300679][ T6031] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 99.303370][ T6031] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 99.313437][ T6031] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 99.335610][ T6031] hsr_slave_0: entered promiscuous mode [ 99.338538][ T6031] hsr_slave_1: entered promiscuous mode [ 99.450228][ T6031] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 99.459075][ T6031] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 99.465498][ T6031] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 99.471607][ T6031] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 99.493764][ T6031] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.496438][ T6031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.499704][ T6031] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.502494][ T6031] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.530290][ T6031] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.537213][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.540186][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.549885][ T6031] 8021q: adding VLAN 0 to HW filter on device team0 [ 99.570230][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.572501][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.576968][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.579417][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.680384][ T6031] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 99.709381][ T6031] veth0_vlan: entered promiscuous mode [ 99.718686][ T6031] veth1_vlan: entered promiscuous mode [ 99.738565][ T6031] veth0_macvtap: entered promiscuous mode [ 99.743536][ T6031] veth1_macvtap: entered promiscuous mode [ 99.757306][ T6031] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 99.763806][ T6031] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 99.772664][ T1152] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.775523][ T1152] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.779212][ T1152] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.781820][ T1152] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.872182][ T1149] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.031399][ T1149] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/02/03 22:34:39 executed programs: 0 [ 100.122150][ T5295] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 100.125388][ T5295] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 100.129037][ T5295] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 100.131976][ T5295] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 100.134489][ T5295] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 100.182743][ T1149] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.231359][ T6057] chnl_net:caif_netlink_parms(): no params data found [ 100.265423][ T1149] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.288879][ T6057] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.291223][ T6057] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.293581][ T6057] bridge_slave_0: entered allmulticast mode [ 100.296273][ T6057] bridge_slave_0: entered promiscuous mode [ 100.299505][ T6057] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.301763][ T6057] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.304141][ T6057] bridge_slave_1: entered allmulticast mode [ 100.307568][ T6057] bridge_slave_1: entered promiscuous mode [ 100.324774][ T6057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 100.331027][ T6057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 100.344832][ T6057] team0: Port device team_slave_0 added [ 100.348823][ T6057] team0: Port device team_slave_1 added [ 100.363247][ T6057] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 100.365440][ T6057] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 100.373645][ T6057] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 100.377993][ T6057] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 100.380233][ T6057] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 100.388329][ T6057] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 100.410168][ T6057] hsr_slave_0: entered promiscuous mode [ 100.412463][ T6057] hsr_slave_1: entered promiscuous mode [ 100.414521][ T6057] debugfs: 'hsr0' already exists in 'hsr' [ 100.416539][ T6057] Cannot create hsr debugfs directory [ 102.186857][ T5295] Bluetooth: hci0: command tx timeout [ 103.164980][ T1149] bridge_slave_1: left allmulticast mode [ 103.167124][ T1149] bridge_slave_1: left promiscuous mode [ 103.169406][ T1149] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.174071][ T1149] bridge_slave_0: left allmulticast mode [ 103.175871][ T1149] bridge_slave_0: left promiscuous mode [ 103.178891][ T1149] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.387253][ T1149] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 103.393216][ T1149] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 103.398933][ T1149] bond0 (unregistering): Released all slaves [ 103.477497][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 103.477515][ T40] audit: type=1400 audit(1770158083.195:113): avc: denied { create } for pid=6072 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 103.489984][ T40] audit: type=1400 audit(1770158083.195:114): avc: denied { write } for pid=6072 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2093 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 103.500490][ T40] audit: type=1400 audit(1770158083.195:115): avc: denied { append } for pid=6072 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2093 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 103.522497][ T1149] hsr_slave_0: left promiscuous mode [ 103.524854][ T1149] hsr_slave_1: left promiscuous mode [ 103.527077][ T1149] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 103.529647][ T1149] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 103.532711][ T1149] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 103.535129][ T1149] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 103.537004][ T40] audit: type=1400 audit(1770158083.245:116): avc: denied { unlink } for pid=6075 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2093 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 103.561855][ T1149] veth1_macvtap: left promiscuous mode [ 103.563746][ T1149] veth0_macvtap: left promiscuous mode [ 103.565880][ T1149] veth1_vlan: left promiscuous mode [ 103.567901][ T1149] veth0_vlan: left promiscuous mode [ 103.760784][ T1149] team0 (unregistering): Port device team_slave_1 removed [ 103.780100][ T1149] team0 (unregistering): Port device team_slave_0 removed [ 104.266350][ T5295] Bluetooth: hci0: command tx timeout [ 104.493066][ T6057] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 104.500188][ T6057] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 104.508088][ T6057] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 104.513621][ T6057] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 104.567859][ T6057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 104.582331][ T6057] 8021q: adding VLAN 0 to HW filter on device team0 [ 104.594594][ T1150] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.597623][ T1150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.608161][ T1150] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.611251][ T1150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.775659][ T6057] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 104.812131][ T6057] veth0_vlan: entered promiscuous mode [ 104.819726][ T6057] veth1_vlan: entered promiscuous mode [ 104.839869][ T6057] veth0_macvtap: entered promiscuous mode [ 104.845797][ T6057] veth1_macvtap: entered promiscuous mode [ 104.861776][ T6057] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 104.870621][ T6057] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 104.880837][ T13] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.885361][ T13] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.889141][ T13] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.893203][ T13] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.929410][ T1149] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 104.932775][ T1149] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 104.947867][ T1149] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 104.951258][ T1149] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 104.975468][ T40] audit: type=1404 audit(1770158084.685:117): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 104.998668][ T40] audit: type=1400 audit(1770158084.715:118): avc: denied { read write } for pid=6057 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 107.189759][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 108.864456][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 108.923644][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 109.036301][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 109.113877][ T40] audit: type=1400 audit(1770158088.825:119): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.120497][ T40] audit: type=1400 audit(1770158088.825:120): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.122433][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 109.127261][ T40] audit: type=1400 audit(1770158088.825:121): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.129540][ T5645] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 109.136156][ T40] audit: type=1400 audit(1770158088.825:122): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.139275][ T5645] audit: backlog limit exceeded [ 109.145801][ T40] audit: type=1400 audit(1770158088.825:123): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.149684][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 109.154486][ T40] audit: type=1400 audit(1770158088.825:124): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 109.154666][ T12] bridge_slave_1: left allmulticast mode [ 109.154707][ T12] bridge_slave_1: left promiscuous mode [ 109.154884][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.170607][ T12] bridge_slave_0: left allmulticast mode [ 109.172487][ T12] bridge_slave_0: left promiscuous mode [ 109.174345][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.368091][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 109.372457][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 109.376265][ T12] bond0 (unregistering): Released all slaves [ 109.700916][ T12] hsr_slave_0: left promiscuous mode [ 109.703101][ T12] hsr_slave_1: left promiscuous mode [ 109.705095][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 109.707559][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 109.710030][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 109.712192][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 109.720064][ T12] veth1_macvtap: left promiscuous mode [ 109.721707][ T12] veth0_macvtap: left promiscuous mode [ 109.723370][ T12] veth1_vlan: left promiscuous mode [ 109.725335][ T12] veth0_vlan: left promiscuous mode [ 109.942479][ T12] team0 (unregistering): Port device team_slave_1 removed [ 109.962745][ T12] team0 (unregistering): Port device team_slave_0 removed [ 114.116156][ T40] kauditd_printk_skb: 44876 callbacks suppressed [ 114.116168][ T40] audit: type=1400 audit(1770158093.825:44018): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.124717][ T40] audit: type=1400 audit(1770158093.835:44019): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.126755][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 114.131332][ T40] audit: type=1400 audit(1770158093.835:44020): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.133937][ T5645] audit: audit_lost=330 audit_rate_limit=0 audit_backlog_limit=64 [ 114.140588][ T40] audit: type=1400 audit(1770158093.835:44021): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.143857][ T5645] audit: backlog limit exceeded [ 114.150477][ T40] audit: type=1400 audit(1770158093.835:44022): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.153213][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 114.159198][ T40] audit: type=1400 audit(1770158093.835:44023): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 119.125998][ T40] kauditd_printk_skb: 47344 callbacks suppressed [ 119.126016][ T40] audit: type=1400 audit(1770158098.835:90694): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 119.131128][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 119.137984][ T40] audit: type=1400 audit(1770158098.845:90695): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 119.139960][ T5645] audit: audit_lost=556 audit_rate_limit=0 audit_backlog_limit=64 [ 119.148843][ T40] audit: type=1400 audit(1770158098.845:90696): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 119.151419][ T5645] audit: backlog limit exceeded [ 119.160229][ T40] audit: type=1400 audit(1770158098.845:90697): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 119.162079][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 119.170599][ T40] audit: type=1400 audit(1770158098.845:90698): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 119.172618][ T5645] audit: audit_lost=557 audit_rate_limit=0 audit_backlog_limit=64 [ 124.136042][ T40] kauditd_printk_skb: 40875 callbacks suppressed [ 124.136058][ T40] audit: type=1400 audit(1770158103.845:131573): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 124.144302][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 124.146627][ T40] audit: type=1400 audit(1770158103.855:131574): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 124.149015][ T5645] audit: audit_lost=558 audit_rate_limit=0 audit_backlog_limit=64 [ 124.156102][ T40] audit: type=1400 audit(1770158103.855:131575): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 124.158490][ T5645] audit: backlog limit exceeded [ 124.165149][ T40] audit: type=1400 audit(1770158103.855:131576): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 124.167090][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 124.173291][ T40] audit: type=1400 audit(1770158103.855:131577): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 124.175327][ T5645] audit: audit_lost=559 audit_rate_limit=0 audit_backlog_limit=64