[ 83.836729][ T40] audit: type=1400 audit(1778141884.934:208): avc: denied { transition } for pid=5962 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 83.844098][ T40] audit: type=1400 audit(1778141884.934:209): avc: denied { noatsecure } for pid=5962 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 83.850739][ T40] audit: type=1400 audit(1778141884.934:210): avc: denied { rlimitinh } for pid=5962 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 83.857749][ T40] audit: type=1400 audit(1778141884.934:211): avc: denied { siginh } for pid=5962 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 87.077570][ T1042] cfg80211: failed to load regulatory.db [ 87.793094][ T40] audit: type=1400 audit(1778141888.884:212): avc: denied { write } for pid=5970 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 87.846982][ T40] audit: type=1400 audit(1778141888.944:213): avc: denied { write } for pid=5973 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 88.077782][ T40] audit: type=1400 audit(1778141889.174:214): avc: denied { write } for pid=5976 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 88.126933][ T40] audit: type=1400 audit(1778141889.224:215): avc: denied { write } for pid=5979 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '[localhost]:44652' (ED25519) to the list of known hosts. [ 89.946944][ T40] audit: type=1400 audit(1778141891.044:216): avc: denied { write } for pid=5990 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 89.982261][ T40] audit: type=1400 audit(1778141891.074:217): avc: denied { write } for pid=5993 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 90.209348][ T40] audit: type=1400 audit(1778141891.304:218): avc: denied { write } for pid=6002 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 90.247566][ T40] audit: type=1400 audit(1778141891.344:219): avc: denied { write } for pid=6005 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 2026/05/07 08:18:12 parsed 1 programs [ 91.352951][ T40] audit: type=1400 audit(1778141892.444:220): avc: denied { node_bind } for pid=5989 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 93.499160][ T40] audit: type=1400 audit(1778141894.594:221): avc: denied { read write } for pid=6013 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 93.508869][ T40] audit: type=1400 audit(1778141894.594:222): avc: denied { open } for pid=6013 comm="syz-executor" path="/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 93.537651][ T40] audit: type=1400 audit(1778141894.634:223): avc: denied { unlink } for pid=6013 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 93.982140][ T40] audit: type=1400 audit(1778141895.074:224): avc: denied { relabelto } for pid=6016 comm="mkswap" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 94.796313][ T6013] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 96.718730][ T40] audit: type=1400 audit(1778141897.814:225): avc: denied { sys_module } for pid=6024 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 97.054928][ T6024] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.057738][ T6024] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.060975][ T6024] bridge_slave_0: entered allmulticast mode [ 97.065089][ T6024] bridge_slave_0: entered promiscuous mode [ 97.069947][ T6024] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.072707][ T6024] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.075877][ T6024] bridge_slave_1: entered allmulticast mode [ 97.078596][ T6024] bridge_slave_1: entered promiscuous mode [ 97.093261][ T6024] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 97.098478][ T6024] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 97.118584][ T6024] team0: Port device team_slave_0 added [ 97.123845][ T6024] team0: Port device team_slave_1 added [ 97.145742][ T6024] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 97.148120][ T6024] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 97.156770][ T6024] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 97.161139][ T6024] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 97.163430][ T6024] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 97.171781][ T6024] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 97.204266][ T6024] hsr_slave_0: entered promiscuous mode [ 97.208275][ T6024] hsr_slave_1: entered promiscuous mode [ 97.332016][ T40] audit: type=1400 audit(1778141898.424:226): avc: denied { write } for pid=6040 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 97.388220][ T40] audit: type=1400 audit(1778141898.484:227): avc: denied { write } for pid=6044 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 97.452205][ T40] audit: type=1400 audit(1778141898.544:228): avc: denied { write } for pid=6046 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 97.509599][ T40] audit: type=1400 audit(1778141898.604:229): avc: denied { write } for pid=6049 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 97.601869][ T40] audit: type=1400 audit(1778141898.694:230): avc: denied { write } for pid=6051 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 97.662021][ T40] audit: type=1400 audit(1778141898.754:231): avc: denied { write } for pid=6054 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 97.729989][ T40] audit: type=1400 audit(1778141898.824:232): avc: denied { write } for pid=6056 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 97.752035][ T6024] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 97.758955][ T6024] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 97.762915][ T6024] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 97.776834][ T6024] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 97.781826][ T6024] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 97.785024][ T40] audit: type=1400 audit(1778141898.874:233): avc: denied { write } for pid=6059 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 97.797443][ T6024] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 97.801388][ T6024] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 97.810598][ T6024] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 97.827079][ T6024] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.829550][ T6024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.832048][ T6024] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.834501][ T6024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.868409][ T40] audit: type=1400 audit(1778141898.964:234): avc: denied { write } for pid=6067 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 97.874162][ T6024] 8021q: adding VLAN 0 to HW filter on device bond0 [ 97.891453][ T102] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.897908][ T102] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.908176][ T6024] 8021q: adding VLAN 0 to HW filter on device team0 [ 97.917088][ T102] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.920328][ T102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.928141][ T102] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.931355][ T102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.206455][ T6024] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 98.229813][ T6024] veth0_vlan: entered promiscuous mode [ 98.238201][ T6024] veth1_vlan: entered promiscuous mode [ 98.265106][ T6024] veth0_macvtap: entered promiscuous mode [ 98.271079][ T6024] veth1_macvtap: entered promiscuous mode [ 98.282665][ T6024] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 98.291088][ T6024] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 98.298778][ T95] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.302149][ T95] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.306701][ T95] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.310294][ T95] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.395493][ T95] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 98.464594][ T95] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 98.556301][ T95] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 98.615546][ T95] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 99.555076][ T63] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 99.559929][ T63] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 99.563125][ T63] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 99.567144][ T63] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 99.570707][ T63] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 99.758334][ T102] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 99.763498][ T102] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 99.789118][ T102] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 99.791449][ T102] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 2026/05/07 08:18:21 executed programs: 0 [ 100.480778][ T5089] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 100.484421][ T5089] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 100.487439][ T5089] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 100.490915][ T5089] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 100.493696][ T5089] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 100.785199][ T6197] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.787668][ T6197] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.790056][ T6197] bridge_slave_0: entered allmulticast mode [ 100.792716][ T6197] bridge_slave_0: entered promiscuous mode [ 100.796306][ T6197] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.798752][ T6197] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.801148][ T6197] bridge_slave_1: entered allmulticast mode [ 100.803922][ T6197] bridge_slave_1: entered promiscuous mode [ 100.819087][ T6197] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 100.823510][ T6197] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 100.841252][ T6197] team0: Port device team_slave_0 added [ 100.844353][ T6197] team0: Port device team_slave_1 added [ 100.857402][ T6197] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 100.859733][ T6197] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 100.868098][ T6197] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 100.872454][ T6197] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 100.874834][ T6197] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 100.883115][ T6197] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 100.905797][ T6197] hsr_slave_0: entered promiscuous mode [ 100.908254][ T6197] hsr_slave_1: entered promiscuous mode [ 100.910363][ T6197] debugfs: 'hsr0' already exists in 'hsr' [ 100.912273][ T6197] Cannot create hsr debugfs directory [ 101.702485][ T95] bridge_slave_1: left allmulticast mode [ 101.705189][ T95] bridge_slave_1: left promiscuous mode [ 101.707906][ T95] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.714428][ T95] bridge_slave_0: left allmulticast mode [ 101.717352][ T95] bridge_slave_0: left promiscuous mode [ 101.720020][ T95] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.910919][ T95] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 101.916288][ T95] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 101.920843][ T95] bond0 (unregistering): Released all slaves [ 102.021715][ T40] kauditd_printk_skb: 18 callbacks suppressed [ 102.021727][ T40] audit: type=1400 audit(1778141903.114:253): avc: denied { write } for pid=6217 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 102.072275][ T95] hsr_slave_0: left promiscuous mode [ 102.074615][ T95] hsr_slave_1: left promiscuous mode [ 102.076998][ T95] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 102.079036][ T40] audit: type=1400 audit(1778141903.174:254): avc: denied { write } for pid=6220 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 102.079450][ T95] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 102.091528][ T95] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 102.094066][ T95] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 102.100604][ T95] veth1_macvtap: left promiscuous mode [ 102.102879][ T95] veth0_macvtap: left promiscuous mode [ 102.105304][ T95] veth1_vlan: left promiscuous mode [ 102.107448][ T95] veth0_vlan: left promiscuous mode [ 102.234288][ T95] team0 (unregistering): Port device team_slave_1 removed [ 102.255154][ T95] team0 (unregistering): Port device team_slave_0 removed [ 102.316026][ T5441] 8021q: adding VLAN 0 to HW filter on device eth2 [ 102.385898][ T40] audit: type=1400 audit(1778141903.484:255): avc: denied { write } for pid=6223 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 102.439129][ T40] audit: type=1400 audit(1778141903.534:256): avc: denied { write } for pid=6226 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 102.515360][ T5089] Bluetooth: hci0: command tx timeout [ 102.573111][ T40] audit: type=1400 audit(1778141903.664:257): avc: denied { write } for pid=6229 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 102.626286][ T40] audit: type=1400 audit(1778141903.724:258): avc: denied { write } for pid=6232 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 102.688171][ T40] audit: type=1400 audit(1778141903.784:259): avc: denied { write } for pid=6234 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 102.696998][ T6197] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 102.700874][ T6197] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 102.703782][ T6197] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 102.707506][ T6197] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 102.710278][ T6197] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 102.714290][ T6197] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 102.717076][ T6197] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 102.720847][ T6197] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 102.727113][ T40] audit: type=1400 audit(1778141903.824:260): avc: denied { write } for pid=6237 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 102.773009][ T6197] 8021q: adding VLAN 0 to HW filter on device bond0 [ 102.786471][ T6197] 8021q: adding VLAN 0 to HW filter on device team0 [ 102.793792][ T1167] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.796851][ T1167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.805677][ T102] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.808823][ T102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.337854][ T6197] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 103.369933][ T6197] veth0_vlan: entered promiscuous mode [ 103.378373][ T6197] veth1_vlan: entered promiscuous mode [ 103.433726][ T6197] veth0_macvtap: entered promiscuous mode [ 103.439963][ T6197] veth1_macvtap: entered promiscuous mode [ 103.453118][ T6197] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 103.463798][ T6197] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 103.473573][ T102] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.477563][ T102] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.483228][ T102] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.488217][ T102] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.525466][ T1167] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 103.529231][ T1167] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 103.557065][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 103.560515][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 103.611666][ T40] audit: type=1400 audit(1778141904.704:261): avc: denied { unmount } for pid=6197 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 104.595271][ T5089] Bluetooth: hci0: command tx timeout 2026/05/07 08:18:26 executed programs: 85 [ 106.674827][ T5089] Bluetooth: hci0: command tx timeout [ 108.765043][ T5089] Bluetooth: hci0: command tx timeout 2026/05/07 08:18:31 executed programs: 327 [ 112.144999][ T7072] ================================================================== [ 112.147708][ T7072] BUG: KASAN: slab-use-after-free in afs_dynroot_readdir+0x8d4/0xaf0 [ 112.150356][ T7072] Read of size 4 at addr ffff8880278d0148 by task syz.0.424/7072 [ 112.153635][ T7072] [ 112.155269][ T7072] CPU: 3 UID: 0 PID: 7072 Comm: syz.0.424 Not tainted syzkaller #0 PREEMPT(full) [ 112.155282][ T7072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 112.155289][ T7072] Call Trace: [ 112.155294][ T7072] [ 112.155298][ T7072] dump_stack_lvl+0x100/0x190 [ 112.155313][ T7072] print_report+0x13d/0x4b0 [ 112.155328][ T7072] ? __virt_addr_valid+0x239/0x430 [ 112.155340][ T7072] ? afs_dynroot_readdir+0x8d4/0xaf0 [ 112.155355][ T7072] kasan_report+0xdf/0x1d0 [ 112.155366][ T7072] ? afs_dynroot_readdir+0x8d4/0xaf0 [ 112.155382][ T7072] afs_dynroot_readdir+0x8d4/0xaf0 [ 112.155398][ T7072] ? find_held_lock+0x2b/0x80 [ 112.155408][ T7072] ? __pfx_afs_dynroot_readdir+0x10/0x10 [ 112.155423][ T7072] ? avc_policy_seqno+0x9/0x20 [ 112.155441][ T7072] iterate_dir+0x296/0xae0 [ 112.155479][ T7072] __x64_sys_getdents+0x13b/0x2b0 [ 112.155495][ T7072] ? __pfx___x64_sys_getdents+0x10/0x10 [ 112.155507][ T7072] ? __x64_sys_open+0xfe/0x1d0 [ 112.155522][ T7072] ? __pfx_filldir+0x10/0x10 [ 112.155533][ T7072] ? rcu_is_watching+0x12/0xc0 [ 112.155548][ T7072] do_syscall_64+0x10b/0xf80 [ 112.155561][ T7072] ? clear_bhb_loop+0x40/0x90 [ 112.155572][ T7072] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 112.155583][ T7072] RIP: 0033:0x7f1c3cd9af39 [ 112.155591][ T7072] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 112.155601][ T7072] RSP: 002b:00007f1c3c3fe028 EFLAGS: 00000246 ORIG_RAX: 000000000000004e [ 112.155612][ T7072] RAX: ffffffffffffffda RBX: 00007f1c3d005fa0 RCX: 00007f1c3cd9af39 [ 112.155618][ T7072] RDX: 00000000000000b8 RSI: 0000200000001fc0 RDI: 0000000000000003 [ 112.155626][ T7072] RBP: 00007f1c3ce2fee0 R08: 0000000000000000 R09: 0000000000000000 [ 112.155632][ T7072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 112.155638][ T7072] R13: 00007f1c3d006038 R14: 00007f1c3d005fa0 R15: 00007ffe01af6d58 [ 112.155647][ T7072] [ 112.155650][ T7072] [ 112.222161][ T7072] Allocated by task 7066: [ 112.224021][ T7072] kasan_save_stack+0x30/0x50 [ 112.225795][ T7072] kasan_save_track+0x14/0x30 [ 112.227348][ T7072] __kasan_kmalloc+0xaa/0xb0 [ 112.228928][ T7072] afs_lookup_cell+0x4b8/0x1b10 [ 112.230828][ T7072] afs_dynroot_lookup+0x2e2/0xa80 [ 112.232825][ T7072] __lookup_slow+0x251/0x460 [ 112.234817][ T7072] lookup_slow+0x50/0x70 [ 112.236543][ T7072] path_lookupat+0x5e8/0xc40 [ 112.238528][ T7072] filename_lookup+0x202/0x590 [ 112.240273][ T7072] user_path_at+0x3c/0x60 [ 112.241728][ T7072] __x64_sys_mount+0x1fb/0x310 [ 112.243327][ T7072] do_syscall_64+0x10b/0xf80 [ 112.244893][ T7072] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 112.246838][ T7072] [ 112.247656][ T7072] Freed by task 0: [ 112.248909][ T7072] kasan_save_stack+0x30/0x50 [ 112.250470][ T7072] kasan_save_track+0x14/0x30 [ 112.252039][ T7072] kasan_save_free_info+0x3b/0x70 [ 112.253711][ T7072] __kasan_slab_free+0x5f/0x80 [ 112.255327][ T7072] kfree+0x223/0x6c0 [ 112.256645][ T7072] afs_cell_destroy+0x21c/0x2d0 [ 112.258265][ T7072] rcu_core+0x5a2/0x10d0 [ 112.259692][ T7072] handle_softirqs+0x1ea/0xa00 [ 112.261301][ T7072] __irq_exit_rcu+0x162/0x210 [ 112.262872][ T7072] irq_exit_rcu+0x9/0x30 [ 112.264305][ T7072] sysvec_apic_timer_interrupt+0xa3/0xc0 [ 112.266189][ T7072] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 112.268211][ T7072] [ 112.269025][ T7072] Last potentially related work creation: [ 112.270954][ T7072] kasan_save_stack+0x30/0x50 [ 112.272528][ T7072] kasan_record_aux_stack+0xa7/0xc0 [ 112.274254][ T7072] __call_rcu_common.constprop.0+0xa5/0x9b0 [ 112.276246][ T7072] process_one_work+0xa0e/0x1980 [ 112.278295][ T7072] worker_thread+0x5ef/0xe50 [ 112.279932][ T7072] kthread+0x370/0x450 [ 112.281313][ T7072] ret_from_fork+0x72b/0xd50 [ 112.282857][ T7072] ret_from_fork_asm+0x1a/0x30 [ 112.284481][ T7072] [ 112.285322][ T7072] Second to last potentially related work creation: [ 112.287486][ T7072] kasan_save_stack+0x30/0x50 [ 112.289053][ T7072] kasan_record_aux_stack+0xa7/0xc0 [ 112.290907][ T7072] insert_work+0x36/0x230 [ 112.292575][ T7072] __queue_work+0x9a2/0x1130 [ 112.294176][ T7072] queue_work_on+0x180/0x1e0 [ 112.295753][ T7072] afs_put_cell.part.0+0x1ae/0x240 [ 112.297672][ T7072] afs_manage_cell_work+0x6ad/0x1900 [ 112.299939][ T7072] process_one_work+0xa0e/0x1980 [ 112.301656][ T7072] worker_thread+0x5ef/0xe50 [ 112.303472][ T7072] kthread+0x370/0x450 [ 112.304890][ T7072] ret_from_fork+0x72b/0xd50 [ 112.306448][ T7072] ret_from_fork_asm+0x1a/0x30 [ 112.308329][ T7072] [ 112.309147][ T7072] The buggy address belongs to the object at ffff8880278d0000 [ 112.309147][ T7072] which belongs to the cache kmalloc-1k of size 1024 [ 112.313685][ T7072] The buggy address is located 328 bytes inside of [ 112.313685][ T7072] freed 1024-byte region [ffff8880278d0000, ffff8880278d0400) [ 112.318177][ T7072] [ 112.318993][ T7072] The buggy address belongs to the physical page: [ 112.321114][ T7072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x278d0 [ 112.324004][ T7072] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 112.326756][ T7072] flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 112.329241][ T7072] page_type: f5(slab) [ 112.330577][ T7072] raw: 00fff00000000040 ffff88801b842dc0 dead000000000100 dead000000000122 [ 112.333391][ T7072] raw: 0000000000000000 0000000800100010 00000000f5000000 0000000000000000 [ 112.336237][ T7072] head: 00fff00000000040 ffff88801b842dc0 dead000000000100 dead000000000122 [ 112.339066][ T7072] head: 0000000000000000 0000000800100010 00000000f5000000 0000000000000000 [ 112.341915][ T7072] head: 00fff00000000003 fffffffffffffe01 00000000ffffffff 00000000ffffffff [ 112.344884][ T7072] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 112.348007][ T7072] page dumped because: kasan: bad access detected [ 112.350646][ T7072] page_owner tracks the page as allocated [ 112.353014][ T7072] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5795, tgid 5795 (syz-executor), ts 66687965049, free_ts 66518079218 [ 112.360266][ T7072] post_alloc_hook+0x153/0x170 [ 112.361873][ T7072] get_page_from_freelist+0x11a6/0x33b0 [ 112.363719][ T7072] __alloc_frozen_pages_noprof+0x27c/0x2bc0 [ 112.365716][ T7072] new_slab+0xa6/0x6c0 [ 112.367084][ T7072] refill_objects+0x277/0x420 [ 112.368773][ T7072] __pcs_replace_empty_main+0x375/0x650 [ 112.370610][ T7072] __kmalloc_cache_noprof+0x493/0x6f0 [ 112.372443][ T7072] fqdir_init+0x4f/0x1f0 [ 112.373857][ T7072] ipv4_frags_init_net+0x2b/0x3d0 [ 112.375632][ T7072] ops_init+0x1e2/0x5f0 [ 112.377038][ T7072] setup_net+0x118/0x3a0 [ 112.378447][ T7072] copy_net_ns+0x46f/0x7c0 [ 112.379948][ T7072] create_new_namespaces+0x3ea/0xac0 [ 112.381700][ T7072] unshare_nsproxy_namespaces+0xf2/0x220 [ 112.383559][ T7072] ksys_unshare+0x438/0xab0 [ 112.385115][ T7072] __x64_sys_unshare+0x31/0x40 [ 112.386708][ T7072] page last free pid 10 tgid 10 stack trace: [ 112.388698][ T7072] __free_frozen_pages+0x747/0x1040 [ 112.390421][ T7072] kasan_depopulate_vmalloc_pte+0x5d/0x80 [ 112.392347][ T7072] __apply_to_page_range+0xb1d/0x1520 [ 112.394127][ T7072] __kasan_release_vmalloc+0xd7/0xe0 [ 112.396115][ T7072] purge_vmap_node+0x210/0xb40 [ 112.397724][ T7072] __purge_vmap_area_lazy+0x91b/0xc00 [ 112.399501][ T7072] drain_vmap_area_work+0x27/0x40 [ 112.401176][ T7072] process_one_work+0xa0e/0x1980 [ 112.402813][ T7072] worker_thread+0x5ef/0xe50 [ 112.404428][ T7072] kthread+0x370/0x450 [ 112.405939][ T7072] ret_from_fork+0x72b/0xd50 [ 112.407487][ T7072] ret_from_fork_asm+0x1a/0x30 [ 112.409086][ T7072] [ 112.409902][ T7072] Memory state around the buggy address: [ 112.411755][ T7072] ffff8880278d0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.414415][ T7072] ffff8880278d0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.417089][ T7072] >ffff8880278d0100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.419715][ T7072] ^ [ 112.421823][ T7072] ffff8880278d0180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.424518][ T7072] ffff8880278d0200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 112.427139][ T7072] ================================================================== [ 112.431094][ T7072] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 112.434349][ T7072] CPU: 0 UID: 0 PID: 7072 Comm: syz.0.424 Not tainted syzkaller #0 PREEMPT(full) [ 112.438352][ T7072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 112.442734][ T7072] Call Trace: [ 112.444245][ T7072] [ 112.445572][ T7072] dump_stack_lvl+0x100/0x190 [ 112.447706][ T7072] vpanic+0x552/0x970 [ 112.449480][ T7072] ? __pfx_vpanic+0x10/0x10 [ 112.451532][ T7072] ? afs_dynroot_readdir+0x8d4/0xaf0 [ 112.453902][ T7072] panic+0xd1/0xe0 [ 112.455642][ T7072] ? __pfx_panic+0x10/0x10 [ 112.457613][ T7072] ? afs_dynroot_readdir+0x8d4/0xaf0 [ 112.459930][ T7072] ? preempt_schedule_common+0x42/0xc0 [ 112.462286][ T7072] ? check_panic_on_warn+0x1f/0x90 [ 112.464585][ T7072] check_panic_on_warn.cold+0x19/0x34 [ 112.466905][ T7072] end_report.part.0+0x3a/0x90 [ 112.469034][ T7072] kasan_report.cold+0xe/0x18 [ 112.471136][ T7072] ? afs_dynroot_readdir+0x8d4/0xaf0 [ 112.473444][ T7072] afs_dynroot_readdir+0x8d4/0xaf0 [ 112.475718][ T7072] ? find_held_lock+0x2b/0x80 [ 112.477284][ T7072] ? __pfx_afs_dynroot_readdir+0x10/0x10 [ 112.479142][ T7072] ? avc_policy_seqno+0x9/0x20 [ 112.480802][ T7072] iterate_dir+0x296/0xae0 [ 112.482349][ T7072] __x64_sys_getdents+0x13b/0x2b0 [ 112.484456][ T7072] ? __pfx___x64_sys_getdents+0x10/0x10 [ 112.486940][ T7072] ? __x64_sys_open+0xfe/0x1d0 [ 112.488912][ T7072] ? __pfx_filldir+0x10/0x10 [ 112.490447][ T7072] ? rcu_is_watching+0x12/0xc0 [ 112.492058][ T7072] do_syscall_64+0x10b/0xf80 [ 112.493679][ T7072] ? clear_bhb_loop+0x40/0x90 [ 112.495395][ T7072] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 112.497515][ T7072] RIP: 0033:0x7f1c3cd9af39 [ 112.499464][ T7072] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 112.507626][ T7072] RSP: 002b:00007f1c3c3fe028 EFLAGS: 00000246 ORIG_RAX: 000000000000004e [ 112.511217][ T7072] RAX: ffffffffffffffda RBX: 00007f1c3d005fa0 RCX: 00007f1c3cd9af39 [ 112.514661][ T7072] RDX: 00000000000000b8 RSI: 0000200000001fc0 RDI: 0000000000000003 [ 112.518076][ T7072] RBP: 00007f1c3ce2fee0 R08: 0000000000000000 R09: 0000000000000000 [ 112.521470][ T7072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 112.524305][ T7072] R13: 00007f1c3d006038 R14: 00007f1c3d005fa0 R15: 00007ffe01af6d58 [ 112.526918][ T7072] [ 112.528627][ T7072] Kernel Offset: disabled [ 112.530090][ T7072] Rebooting in 86400 seconds..