[ 52.983948][ T40] audit: type=1400 audit(1772398961.543:61): avc: denied { siginh } for pid=5900 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '[localhost]:62865' (ED25519) to the list of known hosts. [ 59.475669][ T40] audit: type=1400 audit(1772398968.063:62): avc: denied { execute } for pid=5923 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 59.484897][ T40] audit: type=1400 audit(1772398968.063:63): avc: denied { execute_no_trans } for pid=5923 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/03/01 21:02:49 parsed 1 programs [ 60.937825][ T40] audit: type=1400 audit(1772398969.523:64): avc: denied { node_bind } for pid=5923 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 63.471785][ T40] audit: type=1400 audit(1772398972.053:65): avc: denied { mounton } for pid=5933 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.483333][ T40] audit: type=1400 audit(1772398972.073:66): avc: denied { mount } for pid=5933 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.485648][ T5933] cgroup: Unknown subsys name 'net' [ 63.497450][ T40] audit: type=1400 audit(1772398972.083:67): avc: denied { unmount } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.645734][ T5933] cgroup: Unknown subsys name 'cpuset' [ 63.650851][ T5933] cgroup: Unknown subsys name 'rlimit' [ 63.860806][ T40] audit: type=1400 audit(1772398972.443:68): avc: denied { setattr } for pid=5933 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.872412][ T40] audit: type=1400 audit(1772398972.463:69): avc: denied { create } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.881403][ T40] audit: type=1400 audit(1772398972.463:70): avc: denied { write } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.891314][ T40] audit: type=1400 audit(1772398972.463:71): avc: denied { read } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.952947][ T5936] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 64.755348][ T5933] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 66.371659][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 66.371676][ T40] audit: type=1400 audit(1772398974.953:82): avc: denied { execmem } for pid=5940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 66.382779][ T40] audit: type=1400 audit(1772398974.963:83): avc: denied { read } for pid=5941 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.391387][ T40] audit: type=1400 audit(1772398974.963:84): avc: denied { open } for pid=5941 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 66.399171][ T40] audit: type=1400 audit(1772398974.963:85): avc: denied { mounton } for pid=5941 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 66.434956][ T40] audit: type=1400 audit(1772398975.023:86): avc: denied { mount } for pid=5941 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 66.442256][ T40] audit: type=1400 audit(1772398975.023:87): avc: denied { mounton } for pid=5941 comm="syz-executor" path="/syzkaller.B0icBG/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 66.451056][ T40] audit: type=1400 audit(1772398975.023:88): avc: denied { mount } for pid=5941 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 66.458986][ T40] audit: type=1400 audit(1772398975.023:89): avc: denied { mounton } for pid=5941 comm="syz-executor" path="/syzkaller.B0icBG/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 66.467978][ T40] audit: type=1400 audit(1772398975.023:90): avc: denied { mounton } for pid=5941 comm="syz-executor" path="/syzkaller.B0icBG/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=5731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 66.477399][ T40] audit: type=1400 audit(1772398975.033:91): avc: denied { unmount } for pid=5941 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 66.488157][ T5941] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 67.003623][ T5966] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 67.007116][ T5966] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 67.010887][ T5966] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 67.014579][ T5966] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 67.018337][ T5966] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 67.906290][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.909514][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.936728][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.940242][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.411516][ T6003] chnl_net:caif_netlink_parms(): no params data found [ 68.479058][ T6003] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.481996][ T6003] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.488468][ T6003] bridge_slave_0: entered allmulticast mode [ 68.491601][ T6003] bridge_slave_0: entered promiscuous mode [ 68.495944][ T6003] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.498309][ T6003] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.500674][ T6003] bridge_slave_1: entered allmulticast mode [ 68.504323][ T6003] bridge_slave_1: entered promiscuous mode [ 68.541882][ T6003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.547990][ T6003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.565600][ T6003] team0: Port device team_slave_0 added [ 68.571465][ T6003] team0: Port device team_slave_1 added [ 68.593213][ T6003] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.596070][ T6003] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.607676][ T6003] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.614162][ T6003] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.616574][ T6003] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.626275][ T6003] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.666858][ T6003] hsr_slave_0: entered promiscuous mode [ 68.670133][ T6003] hsr_slave_1: entered promiscuous mode [ 68.802440][ T6003] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 68.811370][ T6003] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 68.818158][ T6003] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 68.825840][ T6003] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 68.885223][ T6003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.897409][ T6003] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.905659][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.908517][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.919425][ T81] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.922648][ T81] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.048260][ T6003] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.078791][ T6003] veth0_vlan: entered promiscuous mode [ 69.086708][ T6003] veth1_vlan: entered promiscuous mode [ 69.108812][ T6003] veth0_macvtap: entered promiscuous mode [ 69.114245][ T6003] veth1_macvtap: entered promiscuous mode [ 69.126348][ T6003] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 69.134001][ T6003] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 69.143838][ T153] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.146852][ T153] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.150438][ T153] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.153950][ T153] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.249837][ T1189] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 69.312425][ T1189] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 69.389111][ T1189] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 69.460773][ T1189] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/03/01 21:02:58 executed programs: 0 [ 69.806860][ T5966] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 69.810793][ T5966] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 69.814801][ T5966] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 69.818538][ T5966] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 69.821793][ T5966] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 69.956528][ T6041] chnl_net:caif_netlink_parms(): no params data found [ 70.009568][ T6041] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.012221][ T6041] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.014985][ T6041] bridge_slave_0: entered allmulticast mode [ 70.018223][ T6041] bridge_slave_0: entered promiscuous mode [ 70.023423][ T6041] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.027106][ T6041] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.030154][ T6041] bridge_slave_1: entered allmulticast mode [ 70.034545][ T6041] bridge_slave_1: entered promiscuous mode [ 70.056754][ T6041] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.061564][ T6041] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.088465][ T6041] team0: Port device team_slave_0 added [ 70.093360][ T6041] team0: Port device team_slave_1 added [ 70.119218][ T6041] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 70.122192][ T6041] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 70.133514][ T6041] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.140736][ T6041] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.144415][ T6041] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 70.155645][ T6041] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 70.196404][ T6041] hsr_slave_0: entered promiscuous mode [ 70.198760][ T6041] hsr_slave_1: entered promiscuous mode [ 70.200886][ T6041] debugfs: 'hsr0' already exists in 'hsr' [ 70.202897][ T6041] Cannot create hsr debugfs directory [ 71.902824][ T5966] Bluetooth: hci0: command tx timeout [ 72.563528][ T1189] bridge_slave_1: left allmulticast mode [ 72.566460][ T1189] bridge_slave_1: left promiscuous mode [ 72.569927][ T1189] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.577354][ T1189] bridge_slave_0: left allmulticast mode [ 72.579684][ T1189] bridge_slave_0: left promiscuous mode [ 72.582383][ T1189] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.761839][ T1189] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 72.766843][ T1189] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 72.770884][ T1189] bond0 (unregistering): Released all slaves [ 72.876035][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 72.876051][ T40] audit: type=1400 audit(1772398981.453:112): avc: denied { create } for pid=6053 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.888624][ T40] audit: type=1400 audit(1772398981.463:113): avc: denied { write } for pid=6053 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2099 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.899190][ T40] audit: type=1400 audit(1772398981.463:114): avc: denied { append } for pid=6053 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2099 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.916202][ T1189] hsr_slave_0: left promiscuous mode [ 72.918611][ T1189] hsr_slave_1: left promiscuous mode [ 72.919338][ T40] audit: type=1400 audit(1772398981.503:115): avc: denied { unlink } for pid=6056 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2099 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.921282][ T1189] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 72.931308][ T1189] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 72.936248][ T1189] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 72.938996][ T1189] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 72.946824][ T1189] veth1_macvtap: left promiscuous mode [ 72.949370][ T1189] veth0_macvtap: left promiscuous mode [ 72.951577][ T1189] veth1_vlan: left promiscuous mode [ 72.953733][ T1189] veth0_vlan: left promiscuous mode [ 73.103085][ T1189] team0 (unregistering): Port device team_slave_1 removed [ 73.121248][ T1189] team0 (unregistering): Port device team_slave_0 removed [ 73.508622][ T6041] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 73.513217][ T6041] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 73.518694][ T6041] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 73.528016][ T6041] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 73.595161][ T6041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.607464][ T6041] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.615715][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.619221][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.626832][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.629360][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.839795][ T6041] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.888834][ T6041] veth0_vlan: entered promiscuous mode [ 73.905140][ T6041] veth1_vlan: entered promiscuous mode [ 73.925710][ T6041] veth0_macvtap: entered promiscuous mode [ 73.931428][ T6041] veth1_macvtap: entered promiscuous mode [ 73.944792][ T6041] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.955172][ T6041] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.965194][ T153] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.969327][ T13] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.973680][ T13] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.976675][ T13] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.982573][ T5966] Bluetooth: hci0: command tx timeout [ 74.026085][ T153] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.029245][ T153] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.047447][ T153] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 74.051096][ T153] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 74.083150][ T40] audit: type=1404 audit(1772398982.673:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 74.100471][ T40] audit: type=1400 audit(1772398982.683:117): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.119192][ T40] audit: type=1400 audit(1772398982.703:118): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.131887][ T40] audit: type=1400 audit(1772398982.713:119): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.157984][ T40] audit: type=1400 audit(1772398982.743:120): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.173265][ T40] audit: type=1400 audit(1772398982.763:121): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.062757][ T5966] Bluetooth: hci0: command tx timeout [ 76.386340][ T1418] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.389147][ T1418] ieee802154 phy1 wpan1: encryption failed: -22 [ 77.892661][ T40] kauditd_printk_skb: 200 callbacks suppressed [ 77.892673][ T40] audit: type=1400 audit(1772398986.483:322): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.909514][ T40] audit: type=1400 audit(1772398986.493:323): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.920629][ T40] audit: type=1400 audit(1772398986.503:324): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.966655][ T40] audit: type=1400 audit(1772398986.553:325): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.981145][ T40] audit: type=1400 audit(1772398986.563:326): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.995999][ T40] audit: type=1400 audit(1772398986.583:327): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.014164][ T40] audit: type=1400 audit(1772398986.603:328): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.028771][ T40] audit: type=1400 audit(1772398986.613:329): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.041608][ T40] audit: type=1400 audit(1772398986.623:330): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.079916][ T40] audit: type=1400 audit(1772398986.663:331): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.152795][ T5966] Bluetooth: hci0: command tx timeout [ 82.903520][ T40] kauditd_printk_skb: 255 callbacks suppressed [ 82.903532][ T40] audit: type=1400 audit(1772398991.493:587): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.921737][ T40] audit: type=1400 audit(1772398991.503:588): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.935851][ T40] audit: type=1400 audit(1772398991.523:589): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.956416][ T40] audit: type=1400 audit(1772398991.543:590): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.966045][ T40] audit: type=1400 audit(1772398991.553:591): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.976500][ T40] audit: type=1400 audit(1772398991.563:592): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.009704][ T40] audit: type=1400 audit(1772398991.593:593): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.026089][ T40] audit: type=1400 audit(1772398991.613:594): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.034703][ T40] audit: type=1400 audit(1772398991.623:595): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.062003][ T40] audit: type=1400 audit(1772398991.643:596): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 85.751961][ T814] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.851652][ T814] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.960163][ T814] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.103680][ T814] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.208364][ T814] bridge_slave_1: left allmulticast mode [ 86.210966][ T814] bridge_slave_1: left promiscuous mode [ 86.214091][ T814] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.220521][ T814] bridge_slave_0: left allmulticast mode [ 86.223251][ T814] bridge_slave_0: left promiscuous mode [ 86.225709][ T814] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.411762][ T814] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 86.418261][ T814] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 86.424393][ T814] bond0 (unregistering): Released all slaves [ 86.624357][ T34] cfg80211: failed to load regulatory.db [ 86.736915][ T814] hsr_slave_0: left promiscuous mode [ 86.740429][ T814] hsr_slave_1: left promiscuous mode [ 86.742885][ T814] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 86.745467][ T814] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 86.748945][ T814] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 86.751653][ T814] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 86.757862][ T814] veth1_macvtap: left promiscuous mode [ 86.759822][ T814] veth0_macvtap: left promiscuous mode [ 86.761833][ T814] veth1_vlan: left promiscuous mode [ 86.764791][ T814] veth0_vlan: left promiscuous mode [ 86.919202][ T814] team0 (unregistering): Port device team_slave_1 removed [ 86.940167][ T814] team0 (unregistering): Port device team_slave_0 removed [ 87.912296][ T40] kauditd_printk_skb: 10645 callbacks suppressed [ 87.912309][ T40] audit: type=1400 audit(1772398996.503:11242): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.921233][ T40] audit: type=1400 audit(1772398996.503:11243): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.928583][ T40] audit: type=1400 audit(1772398996.503:11244): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.936082][ T40] audit: type=1400 audit(1772398996.503:11245): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.938593][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.942938][ T40] audit: type=1400 audit(1772398996.503:11246): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.945693][ T5638] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 87.952900][ T40] audit: type=1400 audit(1772398996.503:11247): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.955657][ T5638] audit: backlog limit exceeded [ 87.963588][ T40] audit: type=1400 audit(1772398996.503:11248): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.922087][ T40] kauditd_printk_skb: 37206 callbacks suppressed [ 92.922104][ T40] audit: type=1400 audit(1772399001.503:47780): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.922735][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.924975][ T40] audit: type=1400 audit(1772399001.503:47781): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.934085][ T5638] audit: audit_lost=227 audit_rate_limit=0 audit_backlog_limit=64 [ 92.934106][ T5638] audit: backlog limit exceeded [ 92.934416][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.936663][ T40] audit: type=1400 audit(1772399001.503:47782): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.944551][ T5638] audit: audit_lost=228 audit_rate_limit=0 audit_backlog_limit=64 [ 92.944570][ T5638] audit: backlog limit exceeded [ 92.944779][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.932158][ T40] kauditd_printk_skb: 39428 callbacks suppressed [ 97.932176][ T40] audit: type=1400 audit(1772399006.513:87209): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.944355][ T40] audit: type=1400 audit(1772399006.523:87210): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.952439][ T40] audit: type=1400 audit(1772399006.523:87211): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.959848][ T40] audit: type=1400 audit(1772399006.523:87212): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.967278][ T40] audit: type=1400 audit(1772399006.523:87213): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.970064][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.975485][ T40] audit: type=1400 audit(1772399006.523:87214): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.978011][ T5638] audit: audit_lost=230 audit_rate_limit=0 audit_backlog_limit=64 [ 97.987222][ T40] audit: type=1400 audit(1772399006.523:87215): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.989909][ T5638] audit: backlog limit exceeded [ 102.942082][ T40] kauditd_printk_skb: 37829 callbacks suppressed [ 102.942101][ T40] audit: type=1400 audit(1772399011.523:125045): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.951455][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.953116][ T40] audit: type=1400 audit(1772399011.533:125046): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.955927][ T5638] audit: audit_lost=231 audit_rate_limit=0 audit_backlog_limit=64 [ 102.965875][ T40] audit: type=1400 audit(1772399011.533:125047): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.968943][ T5638] audit: backlog limit exceeded [ 102.977685][ T40] audit: type=1400 audit(1772399011.533:125048): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.980405][ T5638] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.990342][ T40] audit: type=1400 audit(1772399011.533:125049): avc: denied { read } for pid=5638 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.993045][ T5638] audit: audit_lost=232 audit_rate_limit=0 audit_backlog_limit=64