[ 44.065564][ T40] audit: type=1400 audit(1770557889.656:61): avc: denied { siginh } for pid=5848 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 86.484087][ T1027] cfg80211: failed to load regulatory.db Warning: Permanently added '[localhost]:47496' (ED25519) to the list of known hosts. [ 98.862999][ T40] audit: type=1400 audit(1770557944.486:62): avc: denied { execute } for pid=5946 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 98.870198][ T40] audit: type=1400 audit(1770557944.486:63): avc: denied { execute_no_trans } for pid=5946 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/08 13:39:06 parsed 1 programs [ 100.432196][ T40] audit: type=1400 audit(1770557946.046:64): avc: denied { node_bind } for pid=5946 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 102.578270][ T40] audit: type=1400 audit(1770557948.196:65): avc: denied { mounton } for pid=5957 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 102.586469][ T40] audit: type=1400 audit(1770557948.206:66): avc: denied { mount } for pid=5957 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 102.588102][ T5957] cgroup: Unknown subsys name 'net' [ 102.597609][ T40] audit: type=1400 audit(1770557948.216:67): avc: denied { unmount } for pid=5957 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 102.805202][ T5957] cgroup: Unknown subsys name 'cpuset' [ 102.809299][ T5957] cgroup: Unknown subsys name 'rlimit' [ 102.985018][ T40] audit: type=1400 audit(1770557948.606:68): avc: denied { setattr } for pid=5957 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 102.991467][ T40] audit: type=1400 audit(1770557948.606:69): avc: denied { create } for pid=5957 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 102.998365][ T40] audit: type=1400 audit(1770557948.606:70): avc: denied { write } for pid=5957 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 103.005542][ T40] audit: type=1400 audit(1770557948.606:71): avc: denied { read } for pid=5957 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 103.035735][ T5961] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 103.678197][ T5957] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 105.242942][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 105.242959][ T40] audit: type=1400 audit(1770557950.866:82): avc: denied { execmem } for pid=5962 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 105.250812][ T40] audit: type=1400 audit(1770557950.866:83): avc: denied { mounton } for pid=5962 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 105.258201][ T40] audit: type=1400 audit(1770557950.866:84): avc: denied { mount } for pid=5962 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 105.265040][ T40] audit: type=1400 audit(1770557950.866:85): avc: denied { read } for pid=5962 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 105.271488][ T40] audit: type=1400 audit(1770557950.866:86): avc: denied { open } for pid=5962 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 105.278707][ T40] audit: type=1400 audit(1770557950.866:87): avc: denied { mounton } for pid=5962 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 105.296720][ T40] audit: type=1400 audit(1770557950.916:88): avc: denied { mounton } for pid=5962 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=2836 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 105.313256][ T40] audit: type=1400 audit(1770557950.926:89): avc: denied { mount } for pid=5962 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 105.320054][ T40] audit: type=1401 audit(1770557950.926:90): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 105.435260][ T40] audit: type=1400 audit(1770557951.056:91): avc: denied { mount } for pid=5965 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 105.455788][ T5965] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 105.813014][ T5986] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 105.815960][ T5986] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 105.818491][ T5986] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 105.821045][ T5986] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 105.824726][ T5986] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 106.196231][ T62] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 106.199210][ T62] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 106.217871][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 106.220358][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 106.836053][ T6027] chnl_net:caif_netlink_parms(): no params data found [ 106.902682][ T6027] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.905736][ T6027] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.908180][ T6027] bridge_slave_0: entered allmulticast mode [ 106.910836][ T6027] bridge_slave_0: entered promiscuous mode [ 106.915326][ T6027] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.917628][ T6027] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.919864][ T6027] bridge_slave_1: entered allmulticast mode [ 106.922574][ T6027] bridge_slave_1: entered promiscuous mode [ 106.940673][ T6027] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 106.945290][ T6027] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 106.960277][ T6027] team0: Port device team_slave_0 added [ 106.964554][ T6027] team0: Port device team_slave_1 added [ 106.977253][ T6027] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 106.979447][ T6027] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 106.987762][ T6027] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 106.992643][ T6027] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 106.994937][ T6027] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 107.003341][ T6027] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 107.082678][ T6027] hsr_slave_0: entered promiscuous mode [ 107.084905][ T6027] hsr_slave_1: entered promiscuous mode [ 107.171605][ T6027] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 107.177286][ T6027] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 107.181328][ T6027] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 107.194064][ T6027] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 107.234223][ T6027] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.236516][ T6027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.239218][ T6027] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.241495][ T6027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.281458][ T6027] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.290023][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.293478][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.299467][ T6027] 8021q: adding VLAN 0 to HW filter on device team0 [ 107.306643][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.308924][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.314574][ T62] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.316884][ T62] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.418720][ T6027] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.440816][ T6027] veth0_vlan: entered promiscuous mode [ 107.455223][ T6027] veth1_vlan: entered promiscuous mode [ 107.477555][ T6027] veth0_macvtap: entered promiscuous mode [ 107.484353][ T6027] veth1_macvtap: entered promiscuous mode [ 107.496841][ T6027] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 107.503607][ T6027] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 107.509997][ T95] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 107.512993][ T95] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 107.517319][ T95] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 107.520875][ T95] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 107.585337][ T62] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 107.677530][ T62] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 107.781213][ T62] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 107.891886][ T62] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/02/08 13:39:13 executed programs: 0 [ 108.022371][ T5294] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 108.025834][ T5294] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 108.029289][ T5294] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 108.033767][ T5294] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 108.037247][ T5294] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 108.136919][ T6056] chnl_net:caif_netlink_parms(): no params data found [ 108.200162][ T6056] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.203242][ T6056] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.206373][ T6056] bridge_slave_0: entered allmulticast mode [ 108.210300][ T6056] bridge_slave_0: entered promiscuous mode [ 108.215213][ T6056] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.218347][ T6056] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.221424][ T6056] bridge_slave_1: entered allmulticast mode [ 108.225370][ T6056] bridge_slave_1: entered promiscuous mode [ 108.241457][ T6056] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 108.246861][ T6056] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 108.260974][ T6056] team0: Port device team_slave_0 added [ 108.264256][ T6056] team0: Port device team_slave_1 added [ 108.277144][ T6056] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 108.279479][ T6056] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 108.287515][ T6056] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 108.291679][ T6056] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 108.293982][ T6056] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 108.301940][ T6056] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 108.323994][ T6056] hsr_slave_0: entered promiscuous mode [ 108.326326][ T6056] hsr_slave_1: entered promiscuous mode [ 108.328382][ T6056] debugfs: 'hsr0' already exists in 'hsr' [ 108.330240][ T6056] Cannot create hsr debugfs directory [ 110.082897][ T5986] Bluetooth: hci0: command tx timeout [ 110.701013][ T62] bridge_slave_1: left allmulticast mode [ 110.703564][ T62] bridge_slave_1: left promiscuous mode [ 110.706490][ T62] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.712926][ T62] bridge_slave_0: left allmulticast mode [ 110.715267][ T62] bridge_slave_0: left promiscuous mode [ 110.717697][ T62] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.901497][ T62] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 110.905973][ T62] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 110.909543][ T62] bond0 (unregistering): Released all slaves [ 110.992035][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 110.995151][ T40] audit: type=1400 audit(1770557956.606:112): avc: denied { create } for pid=6065 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 111.004447][ T40] audit: type=1400 audit(1770557956.606:113): avc: denied { write } for pid=6065 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2095 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 111.013908][ T40] audit: type=1400 audit(1770557956.606:114): avc: denied { append } for pid=6065 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2095 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 111.036001][ T40] audit: type=1400 audit(1770557956.656:115): avc: denied { unlink } for pid=6068 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2095 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 111.047914][ T62] hsr_slave_0: left promiscuous mode [ 111.050005][ T62] hsr_slave_1: left promiscuous mode [ 111.052016][ T62] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 111.054608][ T62] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 111.057485][ T62] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 111.059810][ T62] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 111.067957][ T62] veth1_macvtap: left promiscuous mode [ 111.069805][ T62] veth0_macvtap: left promiscuous mode [ 111.071615][ T62] veth1_vlan: left promiscuous mode [ 111.073881][ T62] veth0_vlan: left promiscuous mode [ 111.254772][ T62] team0 (unregistering): Port device team_slave_1 removed [ 111.271743][ T62] team0 (unregistering): Port device team_slave_0 removed [ 111.661806][ T6056] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 111.673825][ T6056] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 111.679932][ T6056] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 111.684383][ T6056] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 111.727661][ T6056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 111.736563][ T6056] 8021q: adding VLAN 0 to HW filter on device team0 [ 111.740998][ T95] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.743397][ T95] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.749574][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.751844][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.862506][ T6056] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 111.888437][ T6056] veth0_vlan: entered promiscuous mode [ 111.896683][ T6056] veth1_vlan: entered promiscuous mode [ 111.911204][ T6056] veth0_macvtap: entered promiscuous mode [ 111.916609][ T6056] veth1_macvtap: entered promiscuous mode [ 111.962482][ T6056] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 111.969176][ T6056] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 111.977615][ T13] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.982222][ T13] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.986451][ T13] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.988947][ T13] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 112.024720][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 112.027282][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 112.040989][ T95] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 112.043817][ T95] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 112.070129][ T40] audit: type=1404 audit(1770557957.686:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 112.087217][ T40] audit: type=1400 audit(1770557957.706:117): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 112.099429][ T40] audit: type=1400 audit(1770557957.716:118): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 112.116066][ T40] audit: type=1400 audit(1770557957.736:119): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 112.139223][ T40] audit: type=1400 audit(1770557957.756:120): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 112.151932][ T40] audit: type=1400 audit(1770557957.766:121): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 112.162168][ T5986] Bluetooth: hci0: command tx timeout [ 114.243107][ T5986] Bluetooth: hci0: command tx timeout [ 115.998770][ T40] kauditd_printk_skb: 215 callbacks suppressed [ 115.998788][ T40] audit: type=1400 audit(1770557961.616:337): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.012681][ T40] audit: type=1400 audit(1770557961.636:338): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.025669][ T40] audit: type=1400 audit(1770557961.646:339): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.054890][ T40] audit: type=1400 audit(1770557961.676:340): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.067460][ T40] audit: type=1400 audit(1770557961.686:341): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.078126][ T40] audit: type=1400 audit(1770557961.696:342): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.111887][ T40] audit: type=1400 audit(1770557961.726:343): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.126147][ T40] audit: type=1400 audit(1770557961.746:344): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.140885][ T40] audit: type=1400 audit(1770557961.756:345): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.171561][ T40] audit: type=1400 audit(1770557961.786:346): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 116.322218][ T5986] Bluetooth: hci0: command tx timeout [ 121.006349][ T40] kauditd_printk_skb: 266 callbacks suppressed [ 121.006361][ T40] audit: type=1400 audit(1770557966.626:613): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.039412][ T40] audit: type=1400 audit(1770557966.656:614): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.048313][ T40] audit: type=1400 audit(1770557966.666:615): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.056411][ T40] audit: type=1400 audit(1770557966.676:616): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.090083][ T40] audit: type=1400 audit(1770557966.706:617): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.098036][ T40] audit: type=1400 audit(1770557966.716:618): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.105572][ T40] audit: type=1400 audit(1770557966.726:619): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.140368][ T40] audit: type=1400 audit(1770557966.756:620): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.147979][ T40] audit: type=1400 audit(1770557966.766:621): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.155909][ T40] audit: type=1400 audit(1770557966.776:622): avc: denied { read write } for pid=6056 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 123.216779][ T95] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.359385][ T95] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.419344][ T95] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.482163][ T95] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.573536][ T95] bridge_slave_1: left allmulticast mode [ 123.575975][ T95] bridge_slave_1: left promiscuous mode [ 123.578751][ T95] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.585830][ T95] bridge_slave_0: left allmulticast mode [ 123.588261][ T95] bridge_slave_0: left promiscuous mode [ 123.590790][ T95] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.754135][ T95] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 123.758852][ T95] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 123.762641][ T95] bond0 (unregistering): Released all slaves [ 124.122230][ T95] hsr_slave_0: left promiscuous mode [ 124.124574][ T95] hsr_slave_1: left promiscuous mode [ 124.127429][ T95] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 124.129971][ T95] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 124.133938][ T95] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 124.136266][ T95] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 124.149159][ T95] veth1_macvtap: left promiscuous mode [ 124.151042][ T95] veth0_macvtap: left promiscuous mode [ 124.153092][ T95] veth1_vlan: left promiscuous mode [ 124.154824][ T95] veth0_vlan: left promiscuous mode [ 124.354200][ T95] team0 (unregistering): Port device team_slave_1 removed [ 124.368521][ T95] team0 (unregistering): Port device team_slave_0 removed [ 126.012106][ T40] kauditd_printk_skb: 21745 callbacks suppressed [ 126.012194][ T40] audit: type=1400 audit(1770557971.626:22125): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 126.019327][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 126.022860][ T40] audit: type=1400 audit(1770557971.636:22126): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 126.022891][ T40] audit: type=1400 audit(1770557971.636:22127): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 126.025462][ T5644] audit: audit_lost=82 audit_rate_limit=0 audit_backlog_limit=64 [ 126.033283][ T40] audit: type=1400 audit(1770557971.636:22128): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 126.041807][ T5644] audit: backlog limit exceeded [ 126.042545][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 126.044384][ T40] audit: type=1400 audit(1770557971.636:22129): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 126.053093][ T5644] audit: audit_lost=83 audit_rate_limit=0 audit_backlog_limit=64 [ 131.022160][ T40] kauditd_printk_skb: 48182 callbacks suppressed [ 131.022177][ T40] audit: type=1400 audit(1770557976.636:70311): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 131.031241][ T40] audit: type=1400 audit(1770557976.646:70312): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 131.038160][ T40] audit: type=1400 audit(1770557976.646:70313): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 131.044746][ T40] audit: type=1400 audit(1770557976.646:70314): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 131.045436][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 131.051251][ T40] audit: type=1400 audit(1770557976.646:70315): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 131.053388][ T5644] audit: audit_lost=84 audit_rate_limit=0 audit_backlog_limit=64 [ 131.059858][ T40] audit: type=1400 audit(1770557976.646:70316): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 131.062340][ T5644] audit: backlog limit exceeded [ 131.068811][ T40] audit: type=1400 audit(1770557976.646:70317): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 136.032224][ T40] kauditd_printk_skb: 49787 callbacks suppressed [ 136.032240][ T40] audit: type=1400 audit(1770557981.646:119277): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 136.037997][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 136.043818][ T40] audit: type=1400 audit(1770557981.656:119278): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 136.045582][ T5644] audit: audit_lost=361 audit_rate_limit=0 audit_backlog_limit=64 [ 136.053988][ T40] audit: type=1400 audit(1770557981.656:119279): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 136.056213][ T5644] audit: backlog limit exceeded [ 136.056468][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 136.062786][ T40] audit: type=1400 audit(1770557981.656:119280): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 136.064261][ T5644] audit: audit_lost=362 audit_rate_limit=0 audit_backlog_limit=64 [ 136.066344][ T40] audit: type=1400 audit(1770557981.656:119281): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.684166][ T1422] ieee802154 phy0 wpan0: encryption failed: -22 [ 137.686244][ T1422] ieee802154 phy1 wpan1: encryption failed: -22 [ 141.042174][ T40] kauditd_printk_skb: 44543 callbacks suppressed [ 141.042187][ T40] audit: type=1400 audit(1770557986.666:162759): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 141.048572][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 141.051645][ T40] audit: type=1400 audit(1770557986.666:162760): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 141.053800][ T5644] audit: audit_lost=718 audit_rate_limit=0 audit_backlog_limit=64 [ 141.053813][ T5644] audit: backlog limit exceeded [ 141.053939][ T5644] audit: audit_backlog=65 > audit_backlog_limit=64 [ 141.060420][ T40] audit: type=1400 audit(1770557986.666:162761): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 141.062944][ T5644] audit: audit_lost=719 audit_rate_limit=0 audit_backlog_limit=64 [ 141.064451][ T40] audit: type=1400 audit(1770557986.666:162762): avc: denied { read } for pid=5644 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 141.066430][ T5644] audit: backlog limit exceeded