Warning: Permanently added '[localhost]:53132' (ED25519) to the list of known hosts. [ 60.134278][ T40] audit: type=1400 audit(1772163846.870:62): avc: denied { execute } for pid=5920 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.142358][ T40] audit: type=1400 audit(1772163846.870:63): avc: denied { execute_no_trans } for pid=5920 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/27 03:44:08 parsed 1 programs [ 61.547094][ T40] audit: type=1400 audit(1772163848.280:64): avc: denied { node_bind } for pid=5920 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 63.933786][ T40] audit: type=1400 audit(1772163850.670:65): avc: denied { mounton } for pid=5930 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.943865][ T40] audit: type=1400 audit(1772163850.680:66): avc: denied { mount } for pid=5930 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.946540][ T5930] cgroup: Unknown subsys name 'net' [ 63.955734][ T40] audit: type=1400 audit(1772163850.690:67): avc: denied { unmount } for pid=5930 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.070075][ T5930] cgroup: Unknown subsys name 'cpuset' [ 64.074795][ T5930] cgroup: Unknown subsys name 'rlimit' [ 64.270420][ T40] audit: type=1400 audit(1772163851.000:68): avc: denied { setattr } for pid=5930 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 64.279112][ T40] audit: type=1400 audit(1772163851.000:69): avc: denied { create } for pid=5930 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.287346][ T40] audit: type=1400 audit(1772163851.000:70): avc: denied { write } for pid=5930 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.297018][ T40] audit: type=1400 audit(1772163851.000:71): avc: denied { read } for pid=5930 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.346196][ T5934] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 65.452386][ T5930] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 67.203828][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 67.203847][ T40] audit: type=1400 audit(1772163853.940:82): avc: denied { execmem } for pid=5944 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 67.215686][ T40] audit: type=1400 audit(1772163853.940:83): avc: denied { create } for pid=5944 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 67.222772][ T40] audit: type=1400 audit(1772163853.940:84): avc: denied { sys_admin } for pid=5944 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 67.232314][ T40] audit: type=1400 audit(1772163853.940:85): avc: denied { read } for pid=5945 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 67.241730][ T40] audit: type=1400 audit(1772163853.940:86): avc: denied { open } for pid=5945 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 67.251494][ T40] audit: type=1400 audit(1772163853.940:87): avc: denied { mounton } for pid=5945 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 67.271227][ T40] audit: type=1400 audit(1772163854.000:88): avc: denied { mount } for pid=5945 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 67.278633][ T40] audit: type=1400 audit(1772163854.000:89): avc: denied { mounton } for pid=5945 comm="syz-executor" path="/syzkaller.eciRw6/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 67.287564][ T40] audit: type=1400 audit(1772163854.010:90): avc: denied { mount } for pid=5945 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 67.295007][ T40] audit: type=1400 audit(1772163854.010:91): avc: denied { mounton } for pid=5945 comm="syz-executor" path="/syzkaller.eciRw6/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 67.317230][ T5945] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 68.096493][ T5968] chnl_net:caif_netlink_parms(): no params data found [ 68.219322][ T5968] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.222595][ T5968] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.225235][ T5968] bridge_slave_0: entered allmulticast mode [ 68.228259][ T5968] bridge_slave_0: entered promiscuous mode [ 68.233125][ T5968] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.235720][ T5968] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.237980][ T5968] bridge_slave_1: entered allmulticast mode [ 68.240753][ T5968] bridge_slave_1: entered promiscuous mode [ 68.259567][ T5968] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.266620][ T5968] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.292553][ T5968] team0: Port device team_slave_0 added [ 68.296712][ T5968] team0: Port device team_slave_1 added [ 68.311345][ T5968] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 68.314254][ T5968] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.322806][ T5968] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 68.334987][ T5968] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 68.337308][ T5968] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 68.346167][ T5968] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 68.378691][ T5968] hsr_slave_0: entered promiscuous mode [ 68.383727][ T5968] hsr_slave_1: entered promiscuous mode [ 68.488871][ T5968] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 68.495149][ T5968] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 68.499711][ T5968] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 68.506487][ T5968] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 68.525977][ T5968] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.528932][ T5968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.532360][ T5968] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.534961][ T5968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.586238][ T5968] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.598612][ T71] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.601982][ T71] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.610729][ T5968] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.619415][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.622343][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.631656][ T71] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.634111][ T71] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.753870][ T5968] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.779984][ T5968] veth0_vlan: entered promiscuous mode [ 68.786976][ T5968] veth1_vlan: entered promiscuous mode [ 68.806277][ T5968] veth0_macvtap: entered promiscuous mode [ 68.810464][ T5968] veth1_macvtap: entered promiscuous mode [ 68.820140][ T5968] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.831333][ T5968] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.839693][ T13] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.844636][ T13] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.848204][ T13] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.851205][ T13] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.939666][ T63] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 68.944480][ T63] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 68.948638][ T63] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 68.953794][ T63] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 68.958823][ T63] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 68.982180][ T13] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 69.077277][ T13] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 69.165013][ T13] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 69.214375][ T71] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.216988][ T71] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.234353][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.237705][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.266433][ T13] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/02/27 03:44:17 executed programs: 0 [ 70.716166][ T63] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 70.719974][ T63] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 70.722766][ T63] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 70.726141][ T63] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 70.729093][ T63] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 70.828557][ T6041] chnl_net:caif_netlink_parms(): no params data found [ 70.923299][ T6041] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.926329][ T6041] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.930192][ T6041] bridge_slave_0: entered allmulticast mode [ 70.934983][ T6041] bridge_slave_0: entered promiscuous mode [ 70.939809][ T6041] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.942161][ T6041] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.946128][ T6041] bridge_slave_1: entered allmulticast mode [ 70.950261][ T6041] bridge_slave_1: entered promiscuous mode [ 70.982395][ T6041] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.993915][ T6041] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.015621][ T6041] team0: Port device team_slave_0 added [ 71.020730][ T6041] team0: Port device team_slave_1 added [ 71.040081][ T6041] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 71.044270][ T6041] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 71.055951][ T6041] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 71.062562][ T6041] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 71.068405][ T6041] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 71.082054][ T6041] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 71.126472][ T6041] hsr_slave_0: entered promiscuous mode [ 71.130182][ T6041] hsr_slave_1: entered promiscuous mode [ 71.133482][ T6041] debugfs: 'hsr0' already exists in 'hsr' [ 71.136079][ T6041] Cannot create hsr debugfs directory [ 72.300876][ T13] bridge_slave_1: left allmulticast mode [ 72.303206][ T13] bridge_slave_1: left promiscuous mode [ 72.305688][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.311686][ T13] bridge_slave_0: left allmulticast mode [ 72.314514][ T13] bridge_slave_0: left promiscuous mode [ 72.316551][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.459368][ T13] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 72.464431][ T13] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 72.468722][ T13] bond0 (unregistering): Released all slaves [ 72.556203][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 72.556225][ T40] audit: type=1400 audit(1772163859.290:112): avc: denied { create } for pid=6050 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.568841][ T40] audit: type=1400 audit(1772163859.290:113): avc: denied { write } for pid=6050 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2088 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.580100][ T40] audit: type=1400 audit(1772163859.290:114): avc: denied { append } for pid=6050 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2088 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.618664][ T40] audit: type=1400 audit(1772163859.350:115): avc: denied { unlink } for pid=6053 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2088 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 72.638853][ T13] hsr_slave_0: left promiscuous mode [ 72.642948][ T13] hsr_slave_1: left promiscuous mode [ 72.646296][ T13] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 72.649623][ T13] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 72.656041][ T13] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 72.659434][ T13] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 72.667971][ T13] veth1_macvtap: left promiscuous mode [ 72.669868][ T13] veth0_macvtap: left promiscuous mode [ 72.672111][ T13] veth1_vlan: left promiscuous mode [ 72.675389][ T13] veth0_vlan: left promiscuous mode [ 72.743931][ T5286] Bluetooth: hci0: command tx timeout [ 72.790406][ T13] team0 (unregistering): Port device team_slave_1 removed [ 72.798595][ T13] team0 (unregistering): Port device team_slave_0 removed [ 73.195066][ T6041] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 73.203256][ T6041] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 73.208503][ T6041] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 73.216561][ T6041] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 73.285587][ T6041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.301572][ T6041] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.310422][ T71] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.313042][ T71] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.320995][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.323709][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.647750][ T6041] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.670759][ T6041] veth0_vlan: entered promiscuous mode [ 73.676521][ T6041] veth1_vlan: entered promiscuous mode [ 73.692360][ T6041] veth0_macvtap: entered promiscuous mode [ 73.696421][ T6041] veth1_macvtap: entered promiscuous mode [ 73.709065][ T6041] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.715742][ T6041] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.731878][ T71] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.749823][ T71] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.752807][ T71] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.762051][ T71] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.866946][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.869721][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.895093][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 73.898062][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 73.927505][ T40] audit: type=1404 audit(1772163860.660:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 73.958230][ T40] audit: type=1400 audit(1772163860.690:117): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.977131][ T40] audit: type=1400 audit(1772163860.710:118): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.992960][ T40] audit: type=1400 audit(1772163860.720:119): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.016464][ T40] audit: type=1400 audit(1772163860.750:120): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.034603][ T40] audit: type=1400 audit(1772163860.770:121): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 74.823153][ T5286] Bluetooth: hci0: command tx timeout [ 76.678364][ T1419] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.681255][ T1419] ieee802154 phy1 wpan1: encryption failed: -22 [ 76.903380][ T5286] Bluetooth: hci0: command tx timeout [ 77.571461][ T40] kauditd_printk_skb: 179 callbacks suppressed [ 77.571483][ T40] audit: type=1400 audit(1772163864.300:301): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.584083][ T40] audit: type=1400 audit(1772163864.320:302): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.596569][ T40] audit: type=1400 audit(1772163864.330:303): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.622345][ T40] audit: type=1400 audit(1772163864.350:304): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.633688][ T40] audit: type=1400 audit(1772163864.370:305): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.646620][ T40] audit: type=1400 audit(1772163864.380:306): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.683507][ T40] audit: type=1400 audit(1772163864.420:307): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.692152][ T40] audit: type=1400 audit(1772163864.420:308): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.704137][ T40] audit: type=1400 audit(1772163864.440:309): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.740705][ T40] audit: type=1400 audit(1772163864.470:310): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 78.983277][ T5286] Bluetooth: hci0: command tx timeout [ 82.581676][ T40] kauditd_printk_skb: 263 callbacks suppressed [ 82.581695][ T40] audit: type=1400 audit(1772163869.310:574): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.612094][ T40] audit: type=1400 audit(1772163869.340:575): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.627288][ T40] audit: type=1400 audit(1772163869.360:576): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.637591][ T40] audit: type=1400 audit(1772163869.370:577): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.660466][ T40] audit: type=1400 audit(1772163869.390:578): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.670490][ T40] audit: type=1400 audit(1772163869.400:579): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.680482][ T40] audit: type=1400 audit(1772163869.410:580): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.711419][ T40] audit: type=1400 audit(1772163869.440:581): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.720877][ T40] audit: type=1400 audit(1772163869.450:582): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.732361][ T40] audit: type=1400 audit(1772163869.460:583): avc: denied { read write } for pid=6041 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 85.545040][ T13] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.631035][ T13] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.733853][ T13] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.808561][ T13] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.926149][ T13] bridge_slave_1: left allmulticast mode [ 85.928197][ T13] bridge_slave_1: left promiscuous mode [ 85.930980][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.935528][ T13] bridge_slave_0: left allmulticast mode [ 85.938200][ T13] bridge_slave_0: left promiscuous mode [ 85.940942][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.124757][ T13] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 86.131014][ T13] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 86.136189][ T13] bond0 (unregistering): Released all slaves [ 86.555865][ T13] hsr_slave_0: left promiscuous mode [ 86.558827][ T13] hsr_slave_1: left promiscuous mode [ 86.561790][ T13] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 86.565520][ T13] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 86.569792][ T13] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 86.572990][ T13] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 86.580543][ T13] veth1_macvtap: left promiscuous mode [ 86.583132][ T13] veth0_macvtap: left promiscuous mode [ 86.584992][ T13] veth1_vlan: left promiscuous mode [ 86.587028][ T13] veth0_vlan: left promiscuous mode [ 86.728705][ T13] team0 (unregistering): Port device team_slave_1 removed [ 86.736337][ T13] team0 (unregistering): Port device team_slave_0 removed [ 86.905923][ T29] cfg80211: failed to load regulatory.db [ 87.582944][ T40] kauditd_printk_skb: 12309 callbacks suppressed [ 87.582965][ T40] audit: type=1400 audit(1772163874.310:12662): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.589900][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.595670][ T40] audit: type=1400 audit(1772163874.320:12663): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.598509][ T5637] audit: audit_lost=78 audit_rate_limit=0 audit_backlog_limit=64 [ 87.608397][ T40] audit: type=1400 audit(1772163874.320:12664): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.611859][ T5637] audit: backlog limit exceeded [ 87.620799][ T40] audit: type=1400 audit(1772163874.320:12665): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.623920][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.632254][ T40] audit: type=1400 audit(1772163874.320:12666): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.635315][ T5637] audit: audit_lost=79 audit_rate_limit=0 audit_backlog_limit=64 [ 92.593496][ T40] kauditd_printk_skb: 43054 callbacks suppressed [ 92.593511][ T40] audit: type=1400 audit(1772163879.320:55720): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.603527][ T40] audit: type=1400 audit(1772163879.330:55721): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.608742][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.612039][ T40] audit: type=1400 audit(1772163879.330:55722): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.614290][ T5637] audit: audit_lost=80 audit_rate_limit=0 audit_backlog_limit=64 [ 92.621925][ T40] audit: type=1400 audit(1772163879.330:55723): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.624147][ T5637] audit: backlog limit exceeded [ 92.624454][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.631881][ T40] audit: type=1400 audit(1772163879.330:55724): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.633618][ T5637] audit: audit_lost=81 audit_rate_limit=0 audit_backlog_limit=64 [ 97.602985][ T40] kauditd_printk_skb: 43087 callbacks suppressed [ 97.603006][ T40] audit: type=1400 audit(1772163884.340:98568): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.608768][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.614446][ T40] audit: type=1400 audit(1772163884.340:98569): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.616412][ T5637] audit: audit_lost=163 audit_rate_limit=0 audit_backlog_limit=64 [ 97.616423][ T5637] audit: backlog limit exceeded [ 97.616576][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.625788][ T40] audit: type=1400 audit(1772163884.340:98570): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.628167][ T5637] audit: audit_lost=164 audit_rate_limit=0 audit_backlog_limit=64 [ 97.630459][ T40] audit: type=1400 audit(1772163884.340:98571): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.632509][ T5637] audit: backlog limit exceeded [ 102.613019][ T40] kauditd_printk_skb: 45677 callbacks suppressed [ 102.613040][ T40] audit: type=1400 audit(1772163889.340:143643): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.621967][ T40] audit: type=1400 audit(1772163889.350:143644): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.625610][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.628989][ T40] audit: type=1400 audit(1772163889.350:143645): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.631346][ T5637] audit: audit_lost=367 audit_rate_limit=0 audit_backlog_limit=64 [ 102.638521][ T40] audit: type=1400 audit(1772163889.350:143646): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.641606][ T5637] audit: backlog limit exceeded [ 102.648895][ T40] audit: type=1400 audit(1772163889.350:143647): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 102.651669][ T5637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 102.658090][ T40] audit: type=1400 audit(1772163889.350:143648): avc: denied { read } for pid=5637 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0