[ 83.836729][ T40] audit: type=1400 audit(1778141884.934:208): avc: denied { transition } for pid=5962 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 83.844098][ T40] audit: type=1400 audit(1778141884.934:209): avc: denied { noatsecure } for pid=5962 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 83.850739][ T40] audit: type=1400 audit(1778141884.934:210): avc: denied { rlimitinh } for pid=5962 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 83.857749][ T40] audit: type=1400 audit(1778141884.934:211): avc: denied { siginh } for pid=5962 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 87.077570][ T1042] cfg80211: failed to load regulatory.db
[ 87.793094][ T40] audit: type=1400 audit(1778141888.884:212): avc: denied { write } for pid=5970 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 87.846982][ T40] audit: type=1400 audit(1778141888.944:213): avc: denied { write } for pid=5973 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 88.077782][ T40] audit: type=1400 audit(1778141889.174:214): avc: denied { write } for pid=5976 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 88.126933][ T40] audit: type=1400 audit(1778141889.224:215): avc: denied { write } for pid=5979 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
Warning: Permanently added '[localhost]:44652' (ED25519) to the list of known hosts.
[ 89.946944][ T40] audit: type=1400 audit(1778141891.044:216): avc: denied { write } for pid=5990 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 89.982261][ T40] audit: type=1400 audit(1778141891.074:217): avc: denied { write } for pid=5993 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 90.209348][ T40] audit: type=1400 audit(1778141891.304:218): avc: denied { write } for pid=6002 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 90.247566][ T40] audit: type=1400 audit(1778141891.344:219): avc: denied { write } for pid=6005 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
2026/05/07 08:18:12 parsed 1 programs
[ 91.352951][ T40] audit: type=1400 audit(1778141892.444:220): avc: denied { node_bind } for pid=5989 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 93.499160][ T40] audit: type=1400 audit(1778141894.594:221): avc: denied { read write } for pid=6013 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 93.508869][ T40] audit: type=1400 audit(1778141894.594:222): avc: denied { open } for pid=6013 comm="syz-executor" path="/swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 93.537651][ T40] audit: type=1400 audit(1778141894.634:223): avc: denied { unlink } for pid=6013 comm="syz-executor" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[ 93.982140][ T40] audit: type=1400 audit(1778141895.074:224): avc: denied { relabelto } for pid=6016 comm="mkswap" name="swap-file" dev="sda1" ino=2026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
Setting up swapspace version 1, size = 127995904 bytes
[ 94.796313][ T6013] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 96.718730][ T40] audit: type=1400 audit(1778141897.814:225): avc: denied { sys_module } for pid=6024 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 97.054928][ T6024] bridge0: port 1(bridge_slave_0) entered blocking state
[ 97.057738][ T6024] bridge0: port 1(bridge_slave_0) entered disabled state
[ 97.060975][ T6024] bridge_slave_0: entered allmulticast mode
[ 97.065089][ T6024] bridge_slave_0: entered promiscuous mode
[ 97.069947][ T6024] bridge0: port 2(bridge_slave_1) entered blocking state
[ 97.072707][ T6024] bridge0: port 2(bridge_slave_1) entered disabled state
[ 97.075877][ T6024] bridge_slave_1: entered allmulticast mode
[ 97.078596][ T6024] bridge_slave_1: entered promiscuous mode
[ 97.093261][ T6024] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 97.098478][ T6024] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 97.118584][ T6024] team0: Port device team_slave_0 added
[ 97.123845][ T6024] team0: Port device team_slave_1 added
[ 97.145742][ T6024] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 97.148120][ T6024] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 97.156770][ T6024] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 97.161139][ T6024] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 97.163430][ T6024] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 97.171781][ T6024] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 97.204266][ T6024] hsr_slave_0: entered promiscuous mode
[ 97.208275][ T6024] hsr_slave_1: entered promiscuous mode
[ 97.332016][ T40] audit: type=1400 audit(1778141898.424:226): avc: denied { write } for pid=6040 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 97.388220][ T40] audit: type=1400 audit(1778141898.484:227): avc: denied { write } for pid=6044 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 97.452205][ T40] audit: type=1400 audit(1778141898.544:228): avc: denied { write } for pid=6046 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 97.509599][ T40] audit: type=1400 audit(1778141898.604:229): avc: denied { write } for pid=6049 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 97.601869][ T40] audit: type=1400 audit(1778141898.694:230): avc: denied { write } for pid=6051 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 97.662021][ T40] audit: type=1400 audit(1778141898.754:231): avc: denied { write } for pid=6054 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 97.729989][ T40] audit: type=1400 audit(1778141898.824:232): avc: denied { write } for pid=6056 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 97.752035][ T6024] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 97.758955][ T6024] 8021q: adding VLAN 0 to HW filter on device netdevsim0
[ 97.762915][ T6024] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 97.776834][ T6024] 8021q: adding VLAN 0 to HW filter on device netdevsim1
[ 97.781826][ T6024] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 97.785024][ T40] audit: type=1400 audit(1778141898.874:233): avc: denied { write } for pid=6059 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 97.797443][ T6024] 8021q: adding VLAN 0 to HW filter on device netdevsim2
[ 97.801388][ T6024] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 97.810598][ T6024] 8021q: adding VLAN 0 to HW filter on device netdevsim3
[ 97.827079][ T6024] bridge0: port 2(bridge_slave_1) entered blocking state
[ 97.829550][ T6024] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 97.832048][ T6024] bridge0: port 1(bridge_slave_0) entered blocking state
[ 97.834501][ T6024] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 97.868409][ T40] audit: type=1400 audit(1778141898.964:234): avc: denied { write } for pid=6067 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 97.874162][ T6024] 8021q: adding VLAN 0 to HW filter on device bond0
[ 97.891453][ T102] bridge0: port 1(bridge_slave_0) entered disabled state
[ 97.897908][ T102] bridge0: port 2(bridge_slave_1) entered disabled state
[ 97.908176][ T6024] 8021q: adding VLAN 0 to HW filter on device team0
[ 97.917088][ T102] bridge0: port 1(bridge_slave_0) entered blocking state
[ 97.920328][ T102] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 97.928141][ T102] bridge0: port 2(bridge_slave_1) entered blocking state
[ 97.931355][ T102] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 98.206455][ T6024] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 98.229813][ T6024] veth0_vlan: entered promiscuous mode
[ 98.238201][ T6024] veth1_vlan: entered promiscuous mode
[ 98.265106][ T6024] veth0_macvtap: entered promiscuous mode
[ 98.271079][ T6024] veth1_macvtap: entered promiscuous mode
[ 98.282665][ T6024] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 98.291088][ T6024] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 98.298778][ T95] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 98.302149][ T95] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 98.306701][ T95] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 98.310294][ T95] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 98.395493][ T95] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 98.464594][ T95] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 98.556301][ T95] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 98.615546][ T95] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 99.555076][ T63] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 99.559929][ T63] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 99.563125][ T63] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 99.567144][ T63] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 99.570707][ T63] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 99.758334][ T102] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 99.763498][ T102] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 99.789118][ T102] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 99.791449][ T102] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
2026/05/07 08:18:21 executed programs: 0
[ 100.480778][ T5089] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 100.484421][ T5089] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 100.487439][ T5089] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 100.490915][ T5089] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 100.493696][ T5089] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 100.785199][ T6197] bridge0: port 1(bridge_slave_0) entered blocking state
[ 100.787668][ T6197] bridge0: port 1(bridge_slave_0) entered disabled state
[ 100.790056][ T6197] bridge_slave_0: entered allmulticast mode
[ 100.792716][ T6197] bridge_slave_0: entered promiscuous mode
[ 100.796306][ T6197] bridge0: port 2(bridge_slave_1) entered blocking state
[ 100.798752][ T6197] bridge0: port 2(bridge_slave_1) entered disabled state
[ 100.801148][ T6197] bridge_slave_1: entered allmulticast mode
[ 100.803922][ T6197] bridge_slave_1: entered promiscuous mode
[ 100.819087][ T6197] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 100.823510][ T6197] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 100.841252][ T6197] team0: Port device team_slave_0 added
[ 100.844353][ T6197] team0: Port device team_slave_1 added
[ 100.857402][ T6197] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 100.859733][ T6197] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 100.868098][ T6197] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 100.872454][ T6197] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 100.874834][ T6197] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem.
[ 100.883115][ T6197] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 100.905797][ T6197] hsr_slave_0: entered promiscuous mode
[ 100.908254][ T6197] hsr_slave_1: entered promiscuous mode
[ 100.910363][ T6197] debugfs: 'hsr0' already exists in 'hsr'
[ 100.912273][ T6197] Cannot create hsr debugfs directory
[ 101.702485][ T95] bridge_slave_1: left allmulticast mode
[ 101.705189][ T95] bridge_slave_1: left promiscuous mode
[ 101.707906][ T95] bridge0: port 2(bridge_slave_1) entered disabled state
[ 101.714428][ T95] bridge_slave_0: left allmulticast mode
[ 101.717352][ T95] bridge_slave_0: left promiscuous mode
[ 101.720020][ T95] bridge0: port 1(bridge_slave_0) entered disabled state
[ 101.910919][ T95] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 101.916288][ T95] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 101.920843][ T95] bond0 (unregistering): Released all slaves
[ 102.021715][ T40] kauditd_printk_skb: 18 callbacks suppressed
[ 102.021727][ T40] audit: type=1400 audit(1778141903.114:253): avc: denied { write } for pid=6217 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 102.072275][ T95] hsr_slave_0: left promiscuous mode
[ 102.074615][ T95] hsr_slave_1: left promiscuous mode
[ 102.076998][ T95] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[ 102.079036][ T40] audit: type=1400 audit(1778141903.174:254): avc: denied { write } for pid=6220 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 102.079450][ T95] batman_adv: batadv0: Removing interface: batadv_slave_0
[ 102.091528][ T95] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[ 102.094066][ T95] batman_adv: batadv0: Removing interface: batadv_slave_1
[ 102.100604][ T95] veth1_macvtap: left promiscuous mode
[ 102.102879][ T95] veth0_macvtap: left promiscuous mode
[ 102.105304][ T95] veth1_vlan: left promiscuous mode
[ 102.107448][ T95] veth0_vlan: left promiscuous mode
[ 102.234288][ T95] team0 (unregistering): Port device team_slave_1 removed
[ 102.255154][ T95] team0 (unregistering): Port device team_slave_0 removed
[ 102.316026][ T5441] 8021q: adding VLAN 0 to HW filter on device eth2
[ 102.385898][ T40] audit: type=1400 audit(1778141903.484:255): avc: denied { write } for pid=6223 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 102.439129][ T40] audit: type=1400 audit(1778141903.534:256): avc: denied { write } for pid=6226 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 102.515360][ T5089] Bluetooth: hci0: command tx timeout
[ 102.573111][ T40] audit: type=1400 audit(1778141903.664:257): avc: denied { write } for pid=6229 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 102.626286][ T40] audit: type=1400 audit(1778141903.724:258): avc: denied { write } for pid=6232 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 102.688171][ T40] audit: type=1400 audit(1778141903.784:259): avc: denied { write } for pid=6234 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 102.696998][ T6197] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 102.700874][ T6197] 8021q: adding VLAN 0 to HW filter on device netdevsim0
[ 102.703782][ T6197] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 102.707506][ T6197] 8021q: adding VLAN 0 to HW filter on device netdevsim1
[ 102.710278][ T6197] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 102.714290][ T6197] 8021q: adding VLAN 0 to HW filter on device netdevsim2
[ 102.717076][ T6197] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 102.720847][ T6197] 8021q: adding VLAN 0 to HW filter on device netdevsim3
[ 102.727113][ T40] audit: type=1400 audit(1778141903.824:260): avc: denied { write } for pid=6237 comm="rm" name="hook-state" dev="tmpfs" ino=1841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 102.773009][ T6197] 8021q: adding VLAN 0 to HW filter on device bond0
[ 102.786471][ T6197] 8021q: adding VLAN 0 to HW filter on device team0
[ 102.793792][ T1167] bridge0: port 1(bridge_slave_0) entered blocking state
[ 102.796851][ T1167] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 102.805677][ T102] bridge0: port 2(bridge_slave_1) entered blocking state
[ 102.808823][ T102] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 103.337854][ T6197] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 103.369933][ T6197] veth0_vlan: entered promiscuous mode
[ 103.378373][ T6197] veth1_vlan: entered promiscuous mode
[ 103.433726][ T6197] veth0_macvtap: entered promiscuous mode
[ 103.439963][ T6197] veth1_macvtap: entered promiscuous mode
[ 103.453118][ T6197] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 103.463798][ T6197] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 103.473573][ T102] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 103.477563][ T102] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 103.483228][ T102] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 103.488217][ T102] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 103.525466][ T1167] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 103.529231][ T1167] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 103.557065][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 103.560515][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 103.611666][ T40] audit: type=1400 audit(1778141904.704:261): avc: denied { unmount } for pid=6197 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1
[ 104.595271][ T5089] Bluetooth: hci0: command tx timeout
2026/05/07 08:18:26 executed programs: 85
[ 106.674827][ T5089] Bluetooth: hci0: command tx timeout
[ 108.765043][ T5089] Bluetooth: hci0: command tx timeout
2026/05/07 08:18:31 executed programs: 327
[ 112.144999][ T7072] ==================================================================
[ 112.147708][ T7072] BUG: KASAN: slab-use-after-free in afs_dynroot_readdir+0x8d4/0xaf0
[ 112.150356][ T7072] Read of size 4 at addr ffff8880278d0148 by task syz.0.424/7072
[ 112.153635][ T7072]
[ 112.155269][ T7072] CPU: 3 UID: 0 PID: 7072 Comm: syz.0.424 Not tainted syzkaller #0 PREEMPT(full)
[ 112.155282][ T7072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 112.155289][ T7072] Call Trace:
[ 112.155294][ T7072]
[ 112.155298][ T7072] dump_stack_lvl+0x100/0x190
[ 112.155313][ T7072] print_report+0x13d/0x4b0
[ 112.155328][ T7072] ? __virt_addr_valid+0x239/0x430
[ 112.155340][ T7072] ? afs_dynroot_readdir+0x8d4/0xaf0
[ 112.155355][ T7072] kasan_report+0xdf/0x1d0
[ 112.155366][ T7072] ? afs_dynroot_readdir+0x8d4/0xaf0
[ 112.155382][ T7072] afs_dynroot_readdir+0x8d4/0xaf0
[ 112.155398][ T7072] ? find_held_lock+0x2b/0x80
[ 112.155408][ T7072] ? __pfx_afs_dynroot_readdir+0x10/0x10
[ 112.155423][ T7072] ? avc_policy_seqno+0x9/0x20
[ 112.155441][ T7072] iterate_dir+0x296/0xae0
[ 112.155479][ T7072] __x64_sys_getdents+0x13b/0x2b0
[ 112.155495][ T7072] ? __pfx___x64_sys_getdents+0x10/0x10
[ 112.155507][ T7072] ? __x64_sys_open+0xfe/0x1d0
[ 112.155522][ T7072] ? __pfx_filldir+0x10/0x10
[ 112.155533][ T7072] ? rcu_is_watching+0x12/0xc0
[ 112.155548][ T7072] do_syscall_64+0x10b/0xf80
[ 112.155561][ T7072] ? clear_bhb_loop+0x40/0x90
[ 112.155572][ T7072] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 112.155583][ T7072] RIP: 0033:0x7f1c3cd9af39
[ 112.155591][ T7072] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
[ 112.155601][ T7072] RSP: 002b:00007f1c3c3fe028 EFLAGS: 00000246 ORIG_RAX: 000000000000004e
[ 112.155612][ T7072] RAX: ffffffffffffffda RBX: 00007f1c3d005fa0 RCX: 00007f1c3cd9af39
[ 112.155618][ T7072] RDX: 00000000000000b8 RSI: 0000200000001fc0 RDI: 0000000000000003
[ 112.155626][ T7072] RBP: 00007f1c3ce2fee0 R08: 0000000000000000 R09: 0000000000000000
[ 112.155632][ T7072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 112.155638][ T7072] R13: 00007f1c3d006038 R14: 00007f1c3d005fa0 R15: 00007ffe01af6d58
[ 112.155647][ T7072]
[ 112.155650][ T7072]
[ 112.222161][ T7072] Allocated by task 7066:
[ 112.224021][ T7072] kasan_save_stack+0x30/0x50
[ 112.225795][ T7072] kasan_save_track+0x14/0x30
[ 112.227348][ T7072] __kasan_kmalloc+0xaa/0xb0
[ 112.228928][ T7072] afs_lookup_cell+0x4b8/0x1b10
[ 112.230828][ T7072] afs_dynroot_lookup+0x2e2/0xa80
[ 112.232825][ T7072] __lookup_slow+0x251/0x460
[ 112.234817][ T7072] lookup_slow+0x50/0x70
[ 112.236543][ T7072] path_lookupat+0x5e8/0xc40
[ 112.238528][ T7072] filename_lookup+0x202/0x590
[ 112.240273][ T7072] user_path_at+0x3c/0x60
[ 112.241728][ T7072] __x64_sys_mount+0x1fb/0x310
[ 112.243327][ T7072] do_syscall_64+0x10b/0xf80
[ 112.244893][ T7072] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 112.246838][ T7072]
[ 112.247656][ T7072] Freed by task 0:
[ 112.248909][ T7072] kasan_save_stack+0x30/0x50
[ 112.250470][ T7072] kasan_save_track+0x14/0x30
[ 112.252039][ T7072] kasan_save_free_info+0x3b/0x70
[ 112.253711][ T7072] __kasan_slab_free+0x5f/0x80
[ 112.255327][ T7072] kfree+0x223/0x6c0
[ 112.256645][ T7072] afs_cell_destroy+0x21c/0x2d0
[ 112.258265][ T7072] rcu_core+0x5a2/0x10d0
[ 112.259692][ T7072] handle_softirqs+0x1ea/0xa00
[ 112.261301][ T7072] __irq_exit_rcu+0x162/0x210
[ 112.262872][ T7072] irq_exit_rcu+0x9/0x30
[ 112.264305][ T7072] sysvec_apic_timer_interrupt+0xa3/0xc0
[ 112.266189][ T7072] asm_sysvec_apic_timer_interrupt+0x1a/0x20
[ 112.268211][ T7072]
[ 112.269025][ T7072] Last potentially related work creation:
[ 112.270954][ T7072] kasan_save_stack+0x30/0x50
[ 112.272528][ T7072] kasan_record_aux_stack+0xa7/0xc0
[ 112.274254][ T7072] __call_rcu_common.constprop.0+0xa5/0x9b0
[ 112.276246][ T7072] process_one_work+0xa0e/0x1980
[ 112.278295][ T7072] worker_thread+0x5ef/0xe50
[ 112.279932][ T7072] kthread+0x370/0x450
[ 112.281313][ T7072] ret_from_fork+0x72b/0xd50
[ 112.282857][ T7072] ret_from_fork_asm+0x1a/0x30
[ 112.284481][ T7072]
[ 112.285322][ T7072] Second to last potentially related work creation:
[ 112.287486][ T7072] kasan_save_stack+0x30/0x50
[ 112.289053][ T7072] kasan_record_aux_stack+0xa7/0xc0
[ 112.290907][ T7072] insert_work+0x36/0x230
[ 112.292575][ T7072] __queue_work+0x9a2/0x1130
[ 112.294176][ T7072] queue_work_on+0x180/0x1e0
[ 112.295753][ T7072] afs_put_cell.part.0+0x1ae/0x240
[ 112.297672][ T7072] afs_manage_cell_work+0x6ad/0x1900
[ 112.299939][ T7072] process_one_work+0xa0e/0x1980
[ 112.301656][ T7072] worker_thread+0x5ef/0xe50
[ 112.303472][ T7072] kthread+0x370/0x450
[ 112.304890][ T7072] ret_from_fork+0x72b/0xd50
[ 112.306448][ T7072] ret_from_fork_asm+0x1a/0x30
[ 112.308329][ T7072]
[ 112.309147][ T7072] The buggy address belongs to the object at ffff8880278d0000
[ 112.309147][ T7072] which belongs to the cache kmalloc-1k of size 1024
[ 112.313685][ T7072] The buggy address is located 328 bytes inside of
[ 112.313685][ T7072] freed 1024-byte region [ffff8880278d0000, ffff8880278d0400)
[ 112.318177][ T7072]
[ 112.318993][ T7072] The buggy address belongs to the physical page:
[ 112.321114][ T7072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x278d0
[ 112.324004][ T7072] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 112.326756][ T7072] flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff)
[ 112.329241][ T7072] page_type: f5(slab)
[ 112.330577][ T7072] raw: 00fff00000000040 ffff88801b842dc0 dead000000000100 dead000000000122
[ 112.333391][ T7072] raw: 0000000000000000 0000000800100010 00000000f5000000 0000000000000000
[ 112.336237][ T7072] head: 00fff00000000040 ffff88801b842dc0 dead000000000100 dead000000000122
[ 112.339066][ T7072] head: 0000000000000000 0000000800100010 00000000f5000000 0000000000000000
[ 112.341915][ T7072] head: 00fff00000000003 fffffffffffffe01 00000000ffffffff 00000000ffffffff
[ 112.344884][ T7072] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[ 112.348007][ T7072] page dumped because: kasan: bad access detected
[ 112.350646][ T7072] page_owner tracks the page as allocated
[ 112.353014][ T7072] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5795, tgid 5795 (syz-executor), ts 66687965049, free_ts 66518079218
[ 112.360266][ T7072] post_alloc_hook+0x153/0x170
[ 112.361873][ T7072] get_page_from_freelist+0x11a6/0x33b0
[ 112.363719][ T7072] __alloc_frozen_pages_noprof+0x27c/0x2bc0
[ 112.365716][ T7072] new_slab+0xa6/0x6c0
[ 112.367084][ T7072] refill_objects+0x277/0x420
[ 112.368773][ T7072] __pcs_replace_empty_main+0x375/0x650
[ 112.370610][ T7072] __kmalloc_cache_noprof+0x493/0x6f0
[ 112.372443][ T7072] fqdir_init+0x4f/0x1f0
[ 112.373857][ T7072] ipv4_frags_init_net+0x2b/0x3d0
[ 112.375632][ T7072] ops_init+0x1e2/0x5f0
[ 112.377038][ T7072] setup_net+0x118/0x3a0
[ 112.378447][ T7072] copy_net_ns+0x46f/0x7c0
[ 112.379948][ T7072] create_new_namespaces+0x3ea/0xac0
[ 112.381700][ T7072] unshare_nsproxy_namespaces+0xf2/0x220
[ 112.383559][ T7072] ksys_unshare+0x438/0xab0
[ 112.385115][ T7072] __x64_sys_unshare+0x31/0x40
[ 112.386708][ T7072] page last free pid 10 tgid 10 stack trace:
[ 112.388698][ T7072] __free_frozen_pages+0x747/0x1040
[ 112.390421][ T7072] kasan_depopulate_vmalloc_pte+0x5d/0x80
[ 112.392347][ T7072] __apply_to_page_range+0xb1d/0x1520
[ 112.394127][ T7072] __kasan_release_vmalloc+0xd7/0xe0
[ 112.396115][ T7072] purge_vmap_node+0x210/0xb40
[ 112.397724][ T7072] __purge_vmap_area_lazy+0x91b/0xc00
[ 112.399501][ T7072] drain_vmap_area_work+0x27/0x40
[ 112.401176][ T7072] process_one_work+0xa0e/0x1980
[ 112.402813][ T7072] worker_thread+0x5ef/0xe50
[ 112.404428][ T7072] kthread+0x370/0x450
[ 112.405939][ T7072] ret_from_fork+0x72b/0xd50
[ 112.407487][ T7072] ret_from_fork_asm+0x1a/0x30
[ 112.409086][ T7072]
[ 112.409902][ T7072] Memory state around the buggy address:
[ 112.411755][ T7072] ffff8880278d0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 112.414415][ T7072] ffff8880278d0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 112.417089][ T7072] >ffff8880278d0100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 112.419715][ T7072] ^
[ 112.421823][ T7072] ffff8880278d0180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 112.424518][ T7072] ffff8880278d0200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 112.427139][ T7072] ==================================================================
[ 112.431094][ T7072] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 112.434349][ T7072] CPU: 0 UID: 0 PID: 7072 Comm: syz.0.424 Not tainted syzkaller #0 PREEMPT(full)
[ 112.438352][ T7072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 112.442734][ T7072] Call Trace:
[ 112.444245][ T7072]
[ 112.445572][ T7072] dump_stack_lvl+0x100/0x190
[ 112.447706][ T7072] vpanic+0x552/0x970
[ 112.449480][ T7072] ? __pfx_vpanic+0x10/0x10
[ 112.451532][ T7072] ? afs_dynroot_readdir+0x8d4/0xaf0
[ 112.453902][ T7072] panic+0xd1/0xe0
[ 112.455642][ T7072] ? __pfx_panic+0x10/0x10
[ 112.457613][ T7072] ? afs_dynroot_readdir+0x8d4/0xaf0
[ 112.459930][ T7072] ? preempt_schedule_common+0x42/0xc0
[ 112.462286][ T7072] ? check_panic_on_warn+0x1f/0x90
[ 112.464585][ T7072] check_panic_on_warn.cold+0x19/0x34
[ 112.466905][ T7072] end_report.part.0+0x3a/0x90
[ 112.469034][ T7072] kasan_report.cold+0xe/0x18
[ 112.471136][ T7072] ? afs_dynroot_readdir+0x8d4/0xaf0
[ 112.473444][ T7072] afs_dynroot_readdir+0x8d4/0xaf0
[ 112.475718][ T7072] ? find_held_lock+0x2b/0x80
[ 112.477284][ T7072] ? __pfx_afs_dynroot_readdir+0x10/0x10
[ 112.479142][ T7072] ? avc_policy_seqno+0x9/0x20
[ 112.480802][ T7072] iterate_dir+0x296/0xae0
[ 112.482349][ T7072] __x64_sys_getdents+0x13b/0x2b0
[ 112.484456][ T7072] ? __pfx___x64_sys_getdents+0x10/0x10
[ 112.486940][ T7072] ? __x64_sys_open+0xfe/0x1d0
[ 112.488912][ T7072] ? __pfx_filldir+0x10/0x10
[ 112.490447][ T7072] ? rcu_is_watching+0x12/0xc0
[ 112.492058][ T7072] do_syscall_64+0x10b/0xf80
[ 112.493679][ T7072] ? clear_bhb_loop+0x40/0x90
[ 112.495395][ T7072] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 112.497515][ T7072] RIP: 0033:0x7f1c3cd9af39
[ 112.499464][ T7072] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
[ 112.507626][ T7072] RSP: 002b:00007f1c3c3fe028 EFLAGS: 00000246 ORIG_RAX: 000000000000004e
[ 112.511217][ T7072] RAX: ffffffffffffffda RBX: 00007f1c3d005fa0 RCX: 00007f1c3cd9af39
[ 112.514661][ T7072] RDX: 00000000000000b8 RSI: 0000200000001fc0 RDI: 0000000000000003
[ 112.518076][ T7072] RBP: 00007f1c3ce2fee0 R08: 0000000000000000 R09: 0000000000000000
[ 112.521470][ T7072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 112.524305][ T7072] R13: 00007f1c3d006038 R14: 00007f1c3d005fa0 R15: 00007ffe01af6d58
[ 112.526918][ T7072]
[ 112.528627][ T7072] Kernel Offset: disabled
[ 112.530090][ T7072] Rebooting in 86400 seconds..