Warning: Permanently added '[localhost]:12215' (ED25519) to the list of known hosts. [ 49.356156][ T40] audit: type=1400 audit(1770799263.880:62): avc: denied { execute } for pid=5918 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 49.363302][ T40] audit: type=1400 audit(1770799263.880:63): avc: denied { execute_no_trans } for pid=5918 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/11 08:41:05 parsed 1 programs [ 50.667885][ T40] audit: type=1400 audit(1770799265.190:64): avc: denied { node_bind } for pid=5918 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 52.659273][ T40] audit: type=1400 audit(1770799267.180:65): avc: denied { mounton } for pid=5931 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 52.669681][ T40] audit: type=1400 audit(1770799267.190:66): avc: denied { mount } for pid=5931 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 52.674123][ T5931] cgroup: Unknown subsys name 'net' [ 52.681394][ T40] audit: type=1400 audit(1770799267.210:67): avc: denied { unmount } for pid=5931 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 52.815150][ T5931] cgroup: Unknown subsys name 'cpuset' [ 52.819846][ T5931] cgroup: Unknown subsys name 'rlimit' [ 53.003382][ T40] audit: type=1400 audit(1770799267.530:68): avc: denied { setattr } for pid=5931 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.010646][ T40] audit: type=1400 audit(1770799267.530:69): avc: denied { create } for pid=5931 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.016962][ T40] audit: type=1400 audit(1770799267.530:70): avc: denied { write } for pid=5931 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.023807][ T40] audit: type=1400 audit(1770799267.530:71): avc: denied { read } for pid=5931 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 53.049604][ T5937] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 53.684242][ T5931] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 55.246401][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 55.246418][ T40] audit: type=1400 audit(1770799269.770:82): avc: denied { execmem } for pid=5941 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 55.301300][ T40] audit: type=1400 audit(1770799269.830:83): avc: denied { read } for pid=5942 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.310691][ T40] audit: type=1400 audit(1770799269.830:84): avc: denied { open } for pid=5942 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.320047][ T40] audit: type=1400 audit(1770799269.840:85): avc: denied { mounton } for pid=5942 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 55.375175][ T40] audit: type=1400 audit(1770799269.900:86): avc: denied { mount } for pid=5942 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 55.382532][ T40] audit: type=1400 audit(1770799269.900:87): avc: denied { mounton } for pid=5942 comm="syz-executor" path="/syzkaller.YC5a1L/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 55.390891][ T40] audit: type=1400 audit(1770799269.900:88): avc: denied { mount } for pid=5942 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 55.397851][ T40] audit: type=1400 audit(1770799269.900:89): avc: denied { mounton } for pid=5942 comm="syz-executor" path="/syzkaller.YC5a1L/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 55.406021][ T40] audit: type=1400 audit(1770799269.900:90): avc: denied { mounton } for pid=5942 comm="syz-executor" path="/syzkaller.YC5a1L/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=6682 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 55.414444][ T40] audit: type=1400 audit(1770799269.910:91): avc: denied { unmount } for pid=5942 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 55.423680][ T5942] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 55.834072][ T5957] chnl_net:caif_netlink_parms(): no params data found [ 55.927909][ T5957] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.930229][ T5957] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.933202][ T5957] bridge_slave_0: entered allmulticast mode [ 55.935873][ T5957] bridge_slave_0: entered promiscuous mode [ 55.939813][ T5957] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.942166][ T5957] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.944403][ T5957] bridge_slave_1: entered allmulticast mode [ 55.947213][ T5957] bridge_slave_1: entered promiscuous mode [ 55.967602][ T5957] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.972098][ T5957] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.986249][ T5957] team0: Port device team_slave_0 added [ 55.989406][ T5957] team0: Port device team_slave_1 added [ 56.002370][ T5957] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 56.004581][ T5957] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 56.012657][ T5957] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 56.017412][ T5957] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 56.019790][ T5957] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 56.027925][ T5957] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 56.049978][ T5957] hsr_slave_0: entered promiscuous mode [ 56.052554][ T5957] hsr_slave_1: entered promiscuous mode [ 56.154931][ T5957] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 56.161662][ T5957] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 56.166180][ T5957] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 56.171508][ T5957] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 56.189150][ T5957] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.191576][ T5957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.194312][ T5957] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.196682][ T5957] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.227125][ T5957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.235121][ T1211] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.238171][ T1211] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.245114][ T5957] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.251247][ T1211] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.254124][ T1211] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.259902][ T1150] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.262651][ T1150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.367340][ T5957] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.387997][ T5957] veth0_vlan: entered promiscuous mode [ 56.394025][ T5957] veth1_vlan: entered promiscuous mode [ 56.410654][ T5957] veth0_macvtap: entered promiscuous mode [ 56.414832][ T5957] veth1_macvtap: entered promiscuous mode [ 56.424047][ T5957] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 56.431023][ T5957] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 56.438123][ T1145] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.445222][ T1145] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.448107][ T1145] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.454289][ T1145] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 56.547750][ T74] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 56.618317][ T74] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 56.698206][ T74] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 56.707538][ T5993] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 56.710506][ T5993] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 56.713191][ T5993] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 56.715999][ T5993] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 56.718619][ T5993] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 56.789746][ T74] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 57.114959][ T1145] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 57.117559][ T1145] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 57.139608][ T1150] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 57.143926][ T1150] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 2026/02/11 08:41:12 executed programs: 0 [ 58.192108][ T5993] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 58.195661][ T5993] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 58.199377][ T5993] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 58.203053][ T5993] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 58.206184][ T5993] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 58.310313][ T6040] chnl_net:caif_netlink_parms(): no params data found [ 58.362712][ T6040] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.365627][ T6040] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.368573][ T6040] bridge_slave_0: entered allmulticast mode [ 58.372965][ T6040] bridge_slave_0: entered promiscuous mode [ 58.378062][ T6040] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.382095][ T6040] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.385189][ T6040] bridge_slave_1: entered allmulticast mode [ 58.388935][ T6040] bridge_slave_1: entered promiscuous mode [ 58.412003][ T6040] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.417783][ T6040] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.440058][ T6040] team0: Port device team_slave_0 added [ 58.444924][ T6040] team0: Port device team_slave_1 added [ 58.460897][ T6040] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 58.463136][ T6040] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 58.471357][ T6040] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 58.475543][ T6040] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 58.477697][ T6040] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 58.486047][ T6040] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 58.508588][ T6040] hsr_slave_0: entered promiscuous mode [ 58.510925][ T6040] hsr_slave_1: entered promiscuous mode [ 58.513055][ T6040] debugfs: 'hsr0' already exists in 'hsr' [ 58.514937][ T6040] Cannot create hsr debugfs directory [ 59.952460][ T74] bridge_slave_1: left allmulticast mode [ 59.954398][ T74] bridge_slave_1: left promiscuous mode [ 59.956607][ T74] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.962338][ T74] bridge_slave_0: left allmulticast mode [ 59.964395][ T74] bridge_slave_0: left promiscuous mode [ 59.966331][ T74] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.184688][ T74] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 60.191271][ T74] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 60.196109][ T74] bond0 (unregistering): Released all slaves [ 60.241268][ T63] Bluetooth: hci0: command tx timeout [ 60.273911][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 60.273923][ T40] audit: type=1400 audit(1770799274.800:112): avc: denied { create } for pid=6050 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 60.283510][ T40] audit: type=1400 audit(1770799274.810:113): avc: denied { write } for pid=6050 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2106 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 60.291590][ T40] audit: type=1400 audit(1770799274.810:114): avc: denied { append } for pid=6050 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2106 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 60.331195][ T40] audit: type=1400 audit(1770799274.860:115): avc: denied { unlink } for pid=6053 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2106 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 60.358654][ T74] hsr_slave_0: left promiscuous mode [ 60.361184][ T74] hsr_slave_1: left promiscuous mode [ 60.363380][ T74] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 60.366007][ T74] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 60.369175][ T74] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 60.375313][ T74] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 60.384548][ T74] veth1_macvtap: left promiscuous mode [ 60.387089][ T74] veth0_macvtap: left promiscuous mode [ 60.389187][ T74] veth1_vlan: left promiscuous mode [ 60.392061][ T74] veth0_vlan: left promiscuous mode [ 60.604630][ T74] team0 (unregistering): Port device team_slave_1 removed [ 60.626424][ T74] team0 (unregistering): Port device team_slave_0 removed [ 61.286109][ T6040] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 61.290781][ T6040] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 61.294490][ T6040] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 61.298861][ T6040] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 61.338823][ T6040] 8021q: adding VLAN 0 to HW filter on device bond0 [ 61.347141][ T6040] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.351772][ T1150] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.354150][ T1150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.359385][ T1150] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.361794][ T1150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.460857][ T6040] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.719814][ T6040] veth0_vlan: entered promiscuous mode [ 61.725096][ T6040] veth1_vlan: entered promiscuous mode [ 61.735598][ T6040] veth0_macvtap: entered promiscuous mode [ 61.741428][ T6040] veth1_macvtap: entered promiscuous mode [ 61.748918][ T6040] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 61.754926][ T6040] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 61.761293][ T1150] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.764237][ T1150] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.767600][ T1150] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.781512][ T1150] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 61.815055][ T1145] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 61.817515][ T1145] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 61.834859][ T1145] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 61.837369][ T1145] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 61.893827][ T40] audit: type=1404 audit(1770799276.410:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 61.907269][ T40] audit: type=1400 audit(1770799276.430:117): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 61.923182][ T40] audit: type=1400 audit(1770799276.450:118): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 61.940731][ T40] audit: type=1400 audit(1770799276.470:119): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 61.960611][ T40] audit: type=1400 audit(1770799276.480:120): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 61.974195][ T40] audit: type=1400 audit(1770799276.500:121): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 62.321691][ T63] Bluetooth: hci0: command tx timeout [ 64.400548][ T63] Bluetooth: hci0: command tx timeout [ 65.296484][ T40] kauditd_printk_skb: 182 callbacks suppressed [ 65.296498][ T40] audit: type=1400 audit(1770799279.820:304): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.314051][ T40] audit: type=1400 audit(1770799279.840:305): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.327256][ T40] audit: type=1400 audit(1770799279.850:306): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.351692][ T40] audit: type=1400 audit(1770799279.880:307): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.362306][ T40] audit: type=1400 audit(1770799279.890:308): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.373755][ T40] audit: type=1400 audit(1770799279.900:309): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.400241][ T40] audit: type=1400 audit(1770799279.920:310): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.411906][ T40] audit: type=1400 audit(1770799279.940:311): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.422409][ T40] audit: type=1400 audit(1770799279.950:312): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.451122][ T40] audit: type=1400 audit(1770799279.980:313): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 66.490510][ T63] Bluetooth: hci0: command tx timeout [ 70.341044][ T40] kauditd_printk_skb: 276 callbacks suppressed [ 70.341061][ T40] audit: type=1400 audit(1770799284.870:590): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.355619][ T40] audit: type=1400 audit(1770799284.880:591): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.365503][ T40] audit: type=1400 audit(1770799284.890:592): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.399579][ T40] audit: type=1400 audit(1770799284.920:593): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.411611][ T40] audit: type=1400 audit(1770799284.940:594): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.421114][ T40] audit: type=1400 audit(1770799284.950:595): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.459955][ T40] audit: type=1400 audit(1770799284.980:596): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.470014][ T40] audit: type=1400 audit(1770799284.990:597): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.480044][ T40] audit: type=1400 audit(1770799285.000:598): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.518243][ T40] audit: type=1400 audit(1770799285.040:599): avc: denied { read write } for pid=6040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.920885][ T13] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.993877][ T13] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 73.101803][ T13] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 73.183012][ T13] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 73.294936][ T13] bridge_slave_1: left allmulticast mode [ 73.296939][ T13] bridge_slave_1: left promiscuous mode [ 73.298782][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.302491][ T13] bridge_slave_0: left allmulticast mode [ 73.304447][ T13] bridge_slave_0: left promiscuous mode [ 73.306256][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.499581][ T13] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 73.503679][ T13] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 73.507248][ T13] bond0 (unregistering): Released all slaves [ 73.935168][ T13] hsr_slave_0: left promiscuous mode [ 73.938229][ T13] hsr_slave_1: left promiscuous mode [ 73.941586][ T13] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 73.944717][ T13] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 73.948665][ T13] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 73.952076][ T13] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 73.964599][ T13] veth1_macvtap: left promiscuous mode [ 73.966768][ T13] veth0_macvtap: left promiscuous mode [ 73.968576][ T13] veth1_vlan: left promiscuous mode [ 73.970311][ T13] veth0_vlan: left promiscuous mode [ 74.231056][ T13] team0 (unregistering): Port device team_slave_1 removed [ 74.255695][ T13] team0 (unregistering): Port device team_slave_0 removed [ 75.350594][ T40] kauditd_printk_skb: 16729 callbacks suppressed [ 75.350610][ T40] audit: type=1400 audit(1770799289.880:16843): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 75.356565][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 75.361224][ T40] audit: type=1400 audit(1770799289.880:16844): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 75.363215][ T5641] audit: audit_lost=163 audit_rate_limit=0 audit_backlog_limit=64 [ 75.371620][ T40] audit: type=1400 audit(1770799289.880:16845): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 75.374065][ T5641] audit: backlog limit exceeded [ 75.374360][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 75.382525][ T40] audit: type=1400 audit(1770799289.880:16846): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 75.383945][ T5641] audit: audit_lost=164 audit_rate_limit=0 audit_backlog_limit=64 [ 75.386499][ T40] audit: type=1400 audit(1770799289.880:16847): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 76.245878][ T1420] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.248586][ T1420] ieee802154 phy1 wpan1: encryption failed: -22 [ 80.360474][ T40] kauditd_printk_skb: 47433 callbacks suppressed [ 80.360487][ T40] audit: type=1400 audit(1770799294.890:62915): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 80.366302][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 80.369184][ T40] audit: type=1400 audit(1770799294.890:62916): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 80.371328][ T5641] audit: audit_lost=620 audit_rate_limit=0 audit_backlog_limit=64 [ 80.377888][ T40] audit: type=1400 audit(1770799294.890:62917): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 80.380411][ T5641] audit: backlog limit exceeded [ 80.380665][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 80.386962][ T40] audit: type=1400 audit(1770799294.890:62918): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 80.388552][ T5641] audit: audit_lost=621 audit_rate_limit=0 audit_backlog_limit=64 [ 80.390704][ T40] audit: type=1400 audit(1770799294.890:62919): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.370479][ T40] kauditd_printk_skb: 49075 callbacks suppressed [ 85.370492][ T40] audit: type=1400 audit(1770799299.900:110809): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.376711][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 85.379139][ T40] audit: type=1400 audit(1770799299.900:110810): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.381330][ T5641] audit: audit_lost=1017 audit_rate_limit=0 audit_backlog_limit=64 [ 85.388149][ T40] audit: type=1400 audit(1770799299.900:110811): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.390495][ T5641] audit: backlog limit exceeded [ 85.397190][ T40] audit: type=1400 audit(1770799299.900:110812): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.399147][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 85.406888][ T40] audit: type=1400 audit(1770799299.900:110813): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 85.408959][ T5641] audit: audit_lost=1018 audit_rate_limit=0 audit_backlog_limit=64 [ 86.491470][ T1026] cfg80211: failed to load regulatory.db [ 90.380538][ T40] kauditd_printk_skb: 44471 callbacks suppressed [ 90.380550][ T40] audit: type=1400 audit(1770799304.910:154399): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.387073][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 90.391455][ T40] audit: type=1400 audit(1770799304.910:154400): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.393529][ T5641] audit: audit_lost=1314 audit_rate_limit=0 audit_backlog_limit=64 [ 90.401211][ T40] audit: type=1400 audit(1770799304.910:154401): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.405524][ T5641] audit: backlog limit exceeded [ 90.410717][ T40] audit: type=1400 audit(1770799304.910:154402): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.412578][ T5641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 90.419370][ T40] audit: type=1400 audit(1770799304.910:154403): avc: denied { read } for pid=5641 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.421599][ T5641] audit: audit_lost=1315 audit_rate_limit=0 audit_backlog_limit=64