[ 44.072490][ T40] audit: type=1400 audit(1770466197.870:59): avc: denied { write } for pid=5831 comm="sh" path="pipe:[6763]" dev="pipefs" ino=6763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 44.082103][ T40] audit: type=1400 audit(1770466197.870:60): avc: denied { rlimitinh } for pid=5831 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 44.091692][ T40] audit: type=1400 audit(1770466197.870:61): avc: denied { siginh } for pid=5831 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '[localhost]:32121' (ED25519) to the list of known hosts. [ 60.620961][ T40] audit: type=1400 audit(1770466214.430:62): avc: denied { execute } for pid=5924 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.628881][ T40] audit: type=1400 audit(1770466214.430:63): avc: denied { execute_no_trans } for pid=5924 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/07 12:10:15 parsed 1 programs [ 61.793992][ T40] audit: type=1400 audit(1770466215.610:64): avc: denied { node_bind } for pid=5924 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 63.864888][ T40] audit: type=1400 audit(1770466217.680:65): avc: denied { mounton } for pid=5934 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.878137][ T5934] cgroup: Unknown subsys name 'net' [ 63.882635][ T40] audit: type=1400 audit(1770466217.690:66): avc: denied { mount } for pid=5934 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.892077][ T40] audit: type=1400 audit(1770466217.700:67): avc: denied { unmount } for pid=5934 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.025426][ T5934] cgroup: Unknown subsys name 'cpuset' [ 64.029802][ T5934] cgroup: Unknown subsys name 'rlimit' [ 64.207335][ T40] audit: type=1400 audit(1770466218.020:68): avc: denied { setattr } for pid=5934 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 64.222724][ T40] audit: type=1400 audit(1770466218.040:69): avc: denied { create } for pid=5934 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.229122][ T40] audit: type=1400 audit(1770466218.040:70): avc: denied { write } for pid=5934 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.235770][ T40] audit: type=1400 audit(1770466218.040:71): avc: denied { read } for pid=5934 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.299722][ T5937] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 64.961823][ T5934] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 66.539574][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 66.539587][ T40] audit: type=1400 audit(1770466220.350:82): avc: denied { execmem } for pid=5949 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 66.616536][ T40] audit: type=1400 audit(1770466220.430:83): avc: denied { read } for pid=5950 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.623094][ T40] audit: type=1400 audit(1770466220.430:84): avc: denied { open } for pid=5950 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.630081][ T40] audit: type=1400 audit(1770466220.430:85): avc: denied { mounton } for pid=5950 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 66.663319][ T40] audit: type=1400 audit(1770466220.480:86): avc: denied { mount } for pid=5950 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 66.673042][ T40] audit: type=1400 audit(1770466220.490:87): avc: denied { mounton } for pid=5950 comm="syz-executor" path="/syzkaller.CtcUqG/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 66.681606][ T40] audit: type=1400 audit(1770466220.490:88): avc: denied { mount } for pid=5950 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 66.689069][ T40] audit: type=1400 audit(1770466220.490:89): avc: denied { mounton } for pid=5950 comm="syz-executor" path="/syzkaller.CtcUqG/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 66.696933][ T40] audit: type=1400 audit(1770466220.500:90): avc: denied { mounton } for pid=5950 comm="syz-executor" path="/syzkaller.CtcUqG/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1942 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 66.705324][ T40] audit: type=1400 audit(1770466220.500:91): avc: denied { unmount } for pid=5950 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 66.717438][ T5950] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 67.161262][ T5965] chnl_net:caif_netlink_parms(): no params data found [ 67.204644][ T5965] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.207436][ T5965] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.209804][ T5965] bridge_slave_0: entered allmulticast mode [ 67.212440][ T5965] bridge_slave_0: entered promiscuous mode [ 67.216601][ T5965] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.218841][ T5965] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.221115][ T5965] bridge_slave_1: entered allmulticast mode [ 67.223944][ T5965] bridge_slave_1: entered promiscuous mode [ 67.239628][ T5965] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.244122][ T5965] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.261788][ T5965] team0: Port device team_slave_0 added [ 67.264938][ T5965] team0: Port device team_slave_1 added [ 67.277220][ T5965] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 67.279487][ T5965] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.287710][ T5965] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 67.292448][ T5965] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 67.294970][ T5965] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 67.303264][ T5965] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 67.326099][ T5965] hsr_slave_0: entered promiscuous mode [ 67.328473][ T5965] hsr_slave_1: entered promiscuous mode [ 67.421809][ T5965] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 67.428990][ T5965] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 67.433680][ T5965] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 67.437933][ T5965] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 67.455944][ T5965] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.458366][ T5965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.461192][ T5965] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.463615][ T5965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.493677][ T5965] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.502357][ T1144] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.506555][ T1144] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.513987][ T5965] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.539582][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.541895][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.548485][ T1144] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.550828][ T1144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.668236][ T5965] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.690697][ T5965] veth0_vlan: entered promiscuous mode [ 67.696427][ T5965] veth1_vlan: entered promiscuous mode [ 67.712949][ T5965] veth0_macvtap: entered promiscuous mode [ 67.716921][ T5965] veth1_macvtap: entered promiscuous mode [ 67.728317][ T5965] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 67.734627][ T5965] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.740745][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.744493][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.747852][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.750599][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.834032][ T46] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.916166][ T46] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 67.970246][ T46] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.071954][ T46] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.204241][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.206692][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.228971][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.231595][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.043458][ T6037] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.046519][ T6037] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.049335][ T6037] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.052237][ T6037] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.056269][ T6037] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 2026/02/07 12:10:23 executed programs: 0 [ 69.365236][ T5290] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.367940][ T5290] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.370588][ T5290] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.375681][ T5290] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.378711][ T5290] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 69.462067][ T6046] chnl_net:caif_netlink_parms(): no params data found [ 69.503628][ T6046] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.505943][ T6046] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.508232][ T6046] bridge_slave_0: entered allmulticast mode [ 69.510887][ T6046] bridge_slave_0: entered promiscuous mode [ 69.514753][ T6046] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.517040][ T6046] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.519352][ T6046] bridge_slave_1: entered allmulticast mode [ 69.521970][ T6046] bridge_slave_1: entered promiscuous mode [ 69.537772][ T6046] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.544053][ T6046] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.559374][ T6046] team0: Port device team_slave_0 added [ 69.563179][ T6046] team0: Port device team_slave_1 added [ 69.576137][ T6046] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 69.578346][ T6046] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 69.587499][ T6046] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 69.592320][ T6046] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 69.595228][ T6046] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 69.603290][ T6046] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 69.626326][ T6046] hsr_slave_0: entered promiscuous mode [ 69.628653][ T6046] hsr_slave_1: entered promiscuous mode [ 69.630758][ T6046] debugfs: 'hsr0' already exists in 'hsr' [ 69.632763][ T6046] Cannot create hsr debugfs directory [ 70.934028][ T46] bridge_slave_1: left allmulticast mode [ 70.936554][ T46] bridge_slave_1: left promiscuous mode [ 70.939512][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.944599][ T46] bridge_slave_0: left allmulticast mode [ 70.946416][ T46] bridge_slave_0: left promiscuous mode [ 70.948270][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.137692][ T46] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 71.142322][ T46] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 71.146305][ T46] bond0 (unregistering): Released all slaves [ 71.266799][ T46] hsr_slave_0: left promiscuous mode [ 71.268944][ T46] hsr_slave_1: left promiscuous mode [ 71.270982][ T46] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 71.273515][ T46] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 71.277164][ T46] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 71.279842][ T46] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 71.288287][ T46] veth1_macvtap: left promiscuous mode [ 71.290239][ T46] veth0_macvtap: left promiscuous mode [ 71.292452][ T46] veth1_vlan: left promiscuous mode [ 71.294442][ T46] veth0_vlan: left promiscuous mode [ 71.458055][ T6037] Bluetooth: hci0: command tx timeout [ 71.548978][ T46] team0 (unregistering): Port device team_slave_1 removed [ 71.567049][ T46] team0 (unregistering): Port device team_slave_0 removed [ 72.031028][ T6046] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 72.035416][ T6046] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 72.040037][ T6046] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 72.045129][ T6046] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 72.094240][ T6046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.108832][ T6046] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.115242][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.117409][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.123999][ T1144] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.126203][ T1144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.240075][ T6046] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 72.492730][ T6046] veth0_vlan: entered promiscuous mode [ 72.500535][ T6046] veth1_vlan: entered promiscuous mode [ 72.518755][ T6046] veth0_macvtap: entered promiscuous mode [ 72.522965][ T6046] veth1_macvtap: entered promiscuous mode [ 72.530562][ T6046] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 72.536406][ T6046] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 72.542235][ T62] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.546493][ T62] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.550340][ T62] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.553343][ T62] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.605823][ T1145] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.608334][ T1145] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.629008][ T1144] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 72.631479][ T1144] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 72.678684][ T40] kauditd_printk_skb: 24 callbacks suppressed [ 72.678696][ T40] audit: type=1404 audit(1770466226.490:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 72.700207][ T40] audit: type=1400 audit(1770466226.510:117): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.711190][ T40] audit: type=1400 audit(1770466226.520:118): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.720197][ T40] audit: type=1400 audit(1770466226.530:119): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.753216][ T40] audit: type=1400 audit(1770466226.570:120): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.764713][ T40] audit: type=1400 audit(1770466226.580:121): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.774369][ T40] audit: type=1400 audit(1770466226.590:122): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.810146][ T40] audit: type=1400 audit(1770466226.620:123): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.822353][ T40] audit: type=1400 audit(1770466226.630:124): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.832110][ T40] audit: type=1400 audit(1770466226.640:125): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.542687][ T6037] Bluetooth: hci0: command tx timeout [ 75.622906][ T6037] Bluetooth: hci0: command tx timeout [ 76.256631][ T1422] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.259085][ T1422] ieee802154 phy1 wpan1: encryption failed: -22 [ 77.693253][ T6037] Bluetooth: hci0: command tx timeout [ 77.701941][ T40] kauditd_printk_skb: 265 callbacks suppressed [ 77.701954][ T40] audit: type=1400 audit(1770466231.510:391): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.715058][ T40] audit: type=1400 audit(1770466231.530:392): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.723837][ T40] audit: type=1400 audit(1770466231.540:393): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.750747][ T40] audit: type=1400 audit(1770466231.560:394): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.763301][ T40] audit: type=1400 audit(1770466231.580:395): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.775804][ T40] audit: type=1400 audit(1770466231.590:396): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.800444][ T40] audit: type=1400 audit(1770466231.610:397): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.812465][ T40] audit: type=1400 audit(1770466231.620:398): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.822755][ T40] audit: type=1400 audit(1770466231.640:399): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.860314][ T40] audit: type=1400 audit(1770466231.670:400): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.730712][ T40] kauditd_printk_skb: 270 callbacks suppressed [ 82.730728][ T40] audit: type=1400 audit(1770466236.540:671): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.740758][ T40] audit: type=1400 audit(1770466236.550:672): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.748335][ T40] audit: type=1400 audit(1770466236.560:673): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.790063][ T40] audit: type=1400 audit(1770466236.600:674): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.798540][ T40] audit: type=1400 audit(1770466236.610:675): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.811089][ T40] audit: type=1400 audit(1770466236.620:676): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.841313][ T40] audit: type=1400 audit(1770466236.650:677): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.851733][ T40] audit: type=1400 audit(1770466236.660:678): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.862858][ T40] audit: type=1400 audit(1770466236.680:679): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.902997][ T40] audit: type=1400 audit(1770466236.720:680): avc: denied { read write } for pid=6046 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.957237][ T1145] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.035183][ T1145] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.110337][ T1145] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.218322][ T1145] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 84.320490][ T1145] bridge_slave_1: left allmulticast mode [ 84.322400][ T1145] bridge_slave_1: left promiscuous mode [ 84.327196][ T1145] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.331296][ T1145] bridge_slave_0: left allmulticast mode [ 84.333750][ T1145] bridge_slave_0: left promiscuous mode [ 84.335619][ T1145] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.501748][ T1145] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 84.507209][ T1145] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 84.511595][ T1145] bond0 (unregistering): Released all slaves [ 84.942458][ T1145] hsr_slave_0: left promiscuous mode [ 84.945038][ T1145] hsr_slave_1: left promiscuous mode [ 84.947153][ T1145] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 84.949801][ T1145] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 84.952999][ T1145] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 84.955504][ T1145] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 84.965758][ T1145] veth1_macvtap: left promiscuous mode [ 84.968144][ T1145] veth0_macvtap: left promiscuous mode [ 84.970223][ T1145] veth1_vlan: left promiscuous mode [ 84.972024][ T1145] veth0_vlan: left promiscuous mode [ 85.238675][ T1145] team0 (unregistering): Port device team_slave_1 removed [ 85.261465][ T1145] team0 (unregistering): Port device team_slave_0 removed [ 86.494144][ T840] cfg80211: failed to load regulatory.db [ 87.732668][ T40] kauditd_printk_skb: 28961 callbacks suppressed [ 87.732681][ T40] audit: type=1400 audit(1770466241.550:29243): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.738708][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.741488][ T40] audit: type=1400 audit(1770466241.550:29244): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.743510][ T5641] audit: audit_lost=134 audit_rate_limit=0 audit_backlog_limit=64 [ 87.750102][ T40] audit: type=1400 audit(1770466241.550:29245): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.752423][ T5641] audit: backlog limit exceeded [ 87.759187][ T40] audit: type=1400 audit(1770466241.550:29246): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.761084][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.767022][ T40] audit: type=1400 audit(1770466241.550:29247): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.768803][ T5641] audit: audit_lost=135 audit_rate_limit=0 audit_backlog_limit=64 [ 92.742692][ T40] kauditd_printk_skb: 48143 callbacks suppressed [ 92.742718][ T40] audit: type=1400 audit(1770466246.560:77063): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.748838][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.754562][ T40] audit: type=1400 audit(1770466246.560:77064): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.756345][ T5641] audit: audit_lost=245 audit_rate_limit=0 audit_backlog_limit=64 [ 92.765518][ T40] audit: type=1400 audit(1770466246.560:77065): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.767824][ T5641] audit: backlog limit exceeded [ 92.777030][ T40] audit: type=1400 audit(1770466246.560:77066): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.778886][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.787818][ T40] audit: type=1400 audit(1770466246.560:77067): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.789555][ T5641] audit: audit_lost=246 audit_rate_limit=0 audit_backlog_limit=64 [ 97.752628][ T40] kauditd_printk_skb: 47924 callbacks suppressed [ 97.752641][ T40] audit: type=1400 audit(1770466251.560:123410): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.758441][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.761196][ T40] audit: type=1400 audit(1770466251.570:123411): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.763218][ T5641] audit: audit_lost=774 audit_rate_limit=0 audit_backlog_limit=64 [ 97.763232][ T5641] audit: backlog limit exceeded [ 97.763392][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.769938][ T40] audit: type=1400 audit(1770466251.570:123412): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.772164][ T5641] audit: audit_lost=775 audit_rate_limit=0 audit_backlog_limit=64 [ 97.773943][ T40] audit: type=1400 audit(1770466251.570:123413): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.775800][ T5641] audit: backlog limit exceeded [ 102.762743][ T40] kauditd_printk_skb: 44942 callbacks suppressed [ 102.762761][ T40] audit: type=1400 audit(1770466256.580:168356): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.771764][ T40] audit: type=1400 audit(1770466256.580:168357): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.779395][ T40] audit: type=1400 audit(1770466256.580:168358): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.786703][ T40] audit: type=1400 audit(1770466256.580:168359): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.794271][ T40] audit: type=1400 audit(1770466256.580:168360): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.799157][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.801143][ T40] audit: type=1400 audit(1770466256.580:168361): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.803995][ T5641] audit: audit_lost=776 audit_rate_limit=0 audit_backlog_limit=64 [ 102.810795][ T40] audit: type=1400 audit(1770466256.580:168362): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.814175][ T5641] audit: backlog limit exceeded