[ 71.547375] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.563479] device bridge_slave_0 left promiscuous mode [ 71.569045] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.606370] team0 (unregistering): Port device team_slave_1 removed [ 71.620192] team0 (unregistering): Port device team_slave_0 removed [ 71.632102] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 71.654811] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 71.700657] bond0 (unregistering): Released all slaves [ 89.421012] kauditd_printk_skb: 19 callbacks suppressed [ 89.421027] audit: type=1400 audit(1662046508.680:134): avc: denied { mounton } for pid=1519 comm="syz-executor" path="/syzcgroup/unified" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.119' (ECDSA) to the list of known hosts. [ 455.022616] audit: type=1400 audit(1662046874.282:135): avc: denied { create } for pid=13288 comm="syz-executor367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 455.042338] audit: type=1400 audit(1662046874.282:136): avc: denied { read } for pid=13288 comm="syz-executor367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 455.062392] audit: type=1400 audit(1662046874.302:137): avc: denied { write } for pid=13288 comm="syz-executor367" path="socket:[85987]" dev="sockfs" ino=85987 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 455.085675] audit: type=1400 audit(1662046874.307:138): avc: denied { setopt } for pid=13288 comm="syz-executor367" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 455.105875] audit: type=1400 audit(1662046874.307:139): avc: denied { write } for pid=13288 comm="syz-executor367" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 455.125938] audit: type=1400 audit(1662046874.307:140): avc: denied { setopt } for pid=13288 comm="syz-executor367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 455.145868] audit: type=1400 audit(1662046874.307:141): avc: denied { ioctl } for pid=13288 comm="syz-executor367" path="socket:[85990]" dev="sockfs" ino=85990 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 455.170995] audit: type=1400 audit(1662046874.307:142): avc: denied { setopt } for pid=13288 comm="syz-executor367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 455.191150] audit: type=1400 audit(1662046874.332:143): avc: denied { write } for pid=13288 comm="syz-executor367" name="ip6_tables_names" dev="proc" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 455.214712] audit: type=1400 audit(1662046874.357:144): avc: denied { connect } for pid=13288 comm="syz-executor367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 600.462793] bpfilter: read fail -512 [ 600.524476] bpfilter: Loaded bpfilter_umh pid 20089 [ 600.526540] Started bpfilter [ 600.530816] kauditd_printk_skb: 3 callbacks suppressed [ 600.530828] audit: type=1400 audit(1662047019.790:148): avc: denied { write } for pid=20086 comm="syz-executor367" path="pipe:[116085]" dev="pipefs" ino=116085 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=fifo_file permissive=1