[ 43.984300][ T40] audit: type=1400 audit(1772389009.059:61): avc: denied { siginh } for pid=5828 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '[localhost]:48504' (ED25519) to the list of known hosts. [ 54.939609][ T40] audit: type=1400 audit(1772389020.039:62): avc: denied { execute } for pid=5921 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 54.946725][ T40] audit: type=1400 audit(1772389020.039:63): avc: denied { execute_no_trans } for pid=5921 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/03/01 18:17:01 parsed 1 programs [ 56.207530][ T40] audit: type=1400 audit(1772389021.309:64): avc: denied { node_bind } for pid=5921 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 58.638494][ T40] audit: type=1400 audit(1772389023.739:65): avc: denied { mounton } for pid=5931 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 58.648540][ T40] audit: type=1400 audit(1772389023.749:66): avc: denied { mount } for pid=5931 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 58.650960][ T5931] cgroup: Unknown subsys name 'net' [ 58.660691][ T40] audit: type=1400 audit(1772389023.759:67): avc: denied { unmount } for pid=5931 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 58.797031][ T5931] cgroup: Unknown subsys name 'cpuset' [ 58.801007][ T5931] cgroup: Unknown subsys name 'rlimit' [ 58.982000][ T40] audit: type=1400 audit(1772389024.079:68): avc: denied { setattr } for pid=5931 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 58.992211][ T40] audit: type=1400 audit(1772389024.079:69): avc: denied { create } for pid=5931 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 59.000216][ T40] audit: type=1400 audit(1772389024.079:70): avc: denied { write } for pid=5931 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 59.009198][ T40] audit: type=1400 audit(1772389024.079:71): avc: denied { read } for pid=5931 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 59.049882][ T5934] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 59.748608][ T5931] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 61.610181][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 61.610198][ T40] audit: type=1400 audit(1772389026.709:82): avc: denied { execmem } for pid=5938 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 61.621277][ T40] audit: type=1400 audit(1772389026.719:83): avc: denied { read } for pid=5939 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.629913][ T40] audit: type=1400 audit(1772389026.719:84): avc: denied { open } for pid=5939 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.637403][ T40] audit: type=1400 audit(1772389026.719:85): avc: denied { mounton } for pid=5939 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 61.665457][ T40] audit: type=1400 audit(1772389026.769:86): avc: denied { mount } for pid=5939 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 61.674794][ T40] audit: type=1400 audit(1772389026.769:87): avc: denied { mounton } for pid=5939 comm="syz-executor" path="/syzkaller.0SoReJ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 61.683394][ T40] audit: type=1400 audit(1772389026.769:88): avc: denied { mount } for pid=5939 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 61.691566][ T40] audit: type=1400 audit(1772389026.769:89): avc: denied { mounton } for pid=5939 comm="syz-executor" path="/syzkaller.0SoReJ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 61.702217][ T40] audit: type=1400 audit(1772389026.769:90): avc: denied { mounton } for pid=5939 comm="syz-executor" path="/syzkaller.0SoReJ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7174 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 61.713033][ T40] audit: type=1400 audit(1772389026.779:91): avc: denied { unmount } for pid=5939 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 61.726701][ T5939] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 61.821444][ T5946] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 61.825944][ T5946] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 61.829731][ T5946] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 61.834189][ T5946] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 61.836908][ T5946] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 63.084293][ T5984] chnl_net:caif_netlink_parms(): no params data found [ 63.165130][ T5984] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.168704][ T5984] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.171794][ T5984] bridge_slave_0: entered allmulticast mode [ 63.176287][ T5984] bridge_slave_0: entered promiscuous mode [ 63.182207][ T5984] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.185723][ T5984] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.188833][ T5984] bridge_slave_1: entered allmulticast mode [ 63.192821][ T5984] bridge_slave_1: entered promiscuous mode [ 63.220707][ T5984] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.228030][ T5984] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.262079][ T5984] team0: Port device team_slave_0 added [ 63.267358][ T5984] team0: Port device team_slave_1 added [ 63.290696][ T5984] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 63.293771][ T5984] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 63.304760][ T5984] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 63.310028][ T5984] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 63.312771][ T5984] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 63.321553][ T5984] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 63.379971][ T5984] hsr_slave_0: entered promiscuous mode [ 63.383234][ T5984] hsr_slave_1: entered promiscuous mode [ 63.545241][ T5984] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 63.553673][ T5984] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 63.560152][ T5984] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 63.566400][ T5984] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 63.596342][ T5984] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.599572][ T5984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.603225][ T5984] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.606341][ T5984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.654021][ T5984] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.668265][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.672040][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.681525][ T5984] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.689959][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.692388][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.700260][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.703427][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.844740][ T5984] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.878251][ T5984] veth0_vlan: entered promiscuous mode [ 63.886011][ T5984] veth1_vlan: entered promiscuous mode [ 63.908496][ T5984] veth0_macvtap: entered promiscuous mode [ 63.914795][ T5984] veth1_macvtap: entered promiscuous mode [ 63.929176][ T5984] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 63.940144][ T5984] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 63.949601][ T101] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.953480][ T101] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.957681][ T101] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 63.960974][ T101] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 64.063808][ T46] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 64.140433][ T46] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 64.235255][ T46] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 64.362140][ T46] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 64.430702][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.434948][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 64.465070][ T1147] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 64.469230][ T1147] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 2026/03/01 18:17:10 executed programs: 0 [ 65.147960][ T5946] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 65.151057][ T5946] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 65.155148][ T5946] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 65.158828][ T5946] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 65.164079][ T5946] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 65.286155][ T6036] chnl_net:caif_netlink_parms(): no params data found [ 65.337780][ T6036] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.340517][ T6036] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.343256][ T6036] bridge_slave_0: entered allmulticast mode [ 65.346305][ T6036] bridge_slave_0: entered promiscuous mode [ 65.349502][ T6036] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.352113][ T6036] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.354503][ T6036] bridge_slave_1: entered allmulticast mode [ 65.357221][ T6036] bridge_slave_1: entered promiscuous mode [ 65.374096][ T6036] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.378387][ T6036] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.393249][ T6036] team0: Port device team_slave_0 added [ 65.396747][ T6036] team0: Port device team_slave_1 added [ 65.411229][ T6036] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 65.413430][ T6036] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 65.421800][ T6036] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 65.426090][ T6036] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 65.428278][ T6036] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 65.436215][ T6036] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 65.458070][ T6036] hsr_slave_0: entered promiscuous mode [ 65.460322][ T6036] hsr_slave_1: entered promiscuous mode [ 65.462398][ T6036] debugfs: 'hsr0' already exists in 'hsr' [ 65.464645][ T6036] Cannot create hsr debugfs directory [ 67.234231][ T5285] Bluetooth: hci0: command tx timeout [ 67.455660][ T46] bridge_slave_1: left allmulticast mode [ 67.457421][ T46] bridge_slave_1: left promiscuous mode [ 67.459760][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.465517][ T46] bridge_slave_0: left allmulticast mode [ 67.467186][ T46] bridge_slave_0: left promiscuous mode [ 67.468907][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.636795][ T46] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 67.642591][ T46] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 67.647287][ T46] bond0 (unregistering): Released all slaves [ 67.729450][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 67.729462][ T40] audit: type=1400 audit(1772389032.829:112): avc: denied { create } for pid=6048 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 67.741186][ T40] audit: type=1400 audit(1772389032.829:113): avc: denied { write } for pid=6048 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2105 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 67.749940][ T40] audit: type=1400 audit(1772389032.829:114): avc: denied { append } for pid=6048 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2105 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 67.777061][ T40] audit: type=1400 audit(1772389032.879:115): avc: denied { unlink } for pid=6051 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2105 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 67.801856][ T46] hsr_slave_0: left promiscuous mode [ 67.804280][ T46] hsr_slave_1: left promiscuous mode [ 67.806345][ T46] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 67.808876][ T46] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 67.812387][ T46] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 67.815003][ T46] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 67.821155][ T46] veth1_macvtap: left promiscuous mode [ 67.822977][ T46] veth0_macvtap: left promiscuous mode [ 67.824998][ T46] veth1_vlan: left promiscuous mode [ 67.826750][ T46] veth0_vlan: left promiscuous mode [ 67.933033][ T46] team0 (unregistering): Port device team_slave_1 removed [ 67.954918][ T46] team0 (unregistering): Port device team_slave_0 removed [ 68.446532][ T6036] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 68.452510][ T6036] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 68.461487][ T6036] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 68.466818][ T6036] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 68.518212][ T6036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.528797][ T6036] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.538059][ T101] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.540758][ T101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.696977][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.699210][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.852396][ T6036] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.884778][ T6036] veth0_vlan: entered promiscuous mode [ 68.891721][ T6036] veth1_vlan: entered promiscuous mode [ 68.912202][ T6036] veth0_macvtap: entered promiscuous mode [ 68.918247][ T6036] veth1_macvtap: entered promiscuous mode [ 68.947251][ T6036] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.955577][ T6036] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.963755][ T1147] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.967312][ T1147] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.970630][ T1147] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.973403][ T1147] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.026883][ T60] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.029423][ T60] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.048176][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.050710][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.078211][ T40] audit: type=1404 audit(1772389034.179:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 69.104535][ T40] audit: type=1400 audit(1772389034.209:117): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.121404][ T40] audit: type=1400 audit(1772389034.219:118): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.131376][ T40] audit: type=1400 audit(1772389034.229:119): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.152864][ T40] audit: type=1400 audit(1772389034.249:120): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.165849][ T40] audit: type=1400 audit(1772389034.269:121): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 69.314281][ T5285] Bluetooth: hci0: command tx timeout [ 71.393612][ T5285] Bluetooth: hci0: command tx timeout [ 72.740202][ T40] kauditd_printk_skb: 193 callbacks suppressed [ 72.740218][ T40] audit: type=1400 audit(1772389037.839:315): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.765397][ T40] audit: type=1400 audit(1772389037.869:316): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.779808][ T40] audit: type=1400 audit(1772389037.879:317): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.793425][ T40] audit: type=1400 audit(1772389037.889:318): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.816817][ T40] audit: type=1400 audit(1772389037.919:319): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.828335][ T40] audit: type=1400 audit(1772389037.929:320): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.841120][ T40] audit: type=1400 audit(1772389037.939:321): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.875356][ T40] audit: type=1400 audit(1772389037.979:322): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.897034][ T40] audit: type=1400 audit(1772389037.999:323): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 72.904553][ T40] audit: type=1400 audit(1772389037.999:324): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 73.473639][ T5285] Bluetooth: hci0: command tx timeout [ 76.438221][ T1417] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.441096][ T1417] ieee802154 phy1 wpan1: encryption failed: -22 [ 77.746195][ T40] kauditd_printk_skb: 270 callbacks suppressed [ 77.746206][ T40] audit: type=1400 audit(1772389042.849:595): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.772724][ T40] audit: type=1400 audit(1772389042.869:596): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.788505][ T40] audit: type=1400 audit(1772389042.889:597): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.799568][ T40] audit: type=1400 audit(1772389042.899:598): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.823175][ T40] audit: type=1400 audit(1772389042.919:599): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.832212][ T40] audit: type=1400 audit(1772389042.929:600): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.841065][ T40] audit: type=1400 audit(1772389042.939:601): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.872088][ T40] audit: type=1400 audit(1772389042.969:602): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.882029][ T40] audit: type=1400 audit(1772389042.979:603): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 77.890931][ T40] audit: type=1400 audit(1772389042.989:604): avc: denied { read write } for pid=6036 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.255180][ T1187] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.332346][ T1187] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.412094][ T1187] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.496140][ T1187] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.592154][ T1187] bridge_slave_1: left allmulticast mode [ 80.594059][ T1187] bridge_slave_1: left promiscuous mode [ 80.595952][ T1187] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.599781][ T1187] bridge_slave_0: left allmulticast mode [ 80.601638][ T1187] bridge_slave_0: left promiscuous mode [ 80.603548][ T1187] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.744044][ T1187] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 80.748503][ T1187] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 80.752025][ T1187] bond0 (unregistering): Released all slaves [ 81.107396][ T1187] hsr_slave_0: left promiscuous mode [ 81.109712][ T1187] hsr_slave_1: left promiscuous mode [ 81.112093][ T1187] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 81.115370][ T1187] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 81.118810][ T1187] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 81.121545][ T1187] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 81.127536][ T1187] veth1_macvtap: left promiscuous mode [ 81.129373][ T1187] veth0_macvtap: left promiscuous mode [ 81.131354][ T1187] veth1_vlan: left promiscuous mode [ 81.133356][ T1187] veth0_vlan: left promiscuous mode [ 81.237969][ T1187] team0 (unregistering): Port device team_slave_1 removed [ 81.246735][ T1187] team0 (unregistering): Port device team_slave_0 removed [ 82.753554][ T40] kauditd_printk_skb: 17066 callbacks suppressed [ 82.753566][ T40] audit: type=1400 audit(1772389047.849:17671): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.759611][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 82.762333][ T40] audit: type=1400 audit(1772389047.859:17672): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.764581][ T5636] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 82.771407][ T40] audit: type=1400 audit(1772389047.859:17673): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.773720][ T5636] audit: backlog limit exceeded [ 82.773984][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 82.780480][ T40] audit: type=1400 audit(1772389047.859:17674): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.782106][ T5636] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 82.784525][ T40] audit: type=1400 audit(1772389047.859:17675): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 86.688664][ T24] cfg80211: failed to load regulatory.db [ 87.763604][ T40] kauditd_printk_skb: 42614 callbacks suppressed [ 87.763615][ T40] audit: type=1400 audit(1772389052.869:59428): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.773388][ T40] audit: type=1400 audit(1772389052.869:59429): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.782090][ T40] audit: type=1400 audit(1772389052.869:59430): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.787496][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 87.789408][ T40] audit: type=1400 audit(1772389052.869:59431): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.791464][ T5636] audit: audit_lost=290 audit_rate_limit=0 audit_backlog_limit=64 [ 87.798530][ T40] audit: type=1400 audit(1772389052.869:59432): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.801105][ T5636] audit: backlog limit exceeded [ 87.807970][ T40] audit: type=1400 audit(1772389052.869:59433): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 87.809884][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.773632][ T40] kauditd_printk_skb: 45219 callbacks suppressed [ 92.773645][ T40] audit: type=1400 audit(1772389057.879:104651): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.785582][ T40] audit: type=1400 audit(1772389057.879:104652): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.788781][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.792406][ T40] audit: type=1400 audit(1772389057.879:104653): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.794599][ T5636] audit: audit_lost=292 audit_rate_limit=0 audit_backlog_limit=64 [ 92.801346][ T40] audit: type=1400 audit(1772389057.879:104654): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.803929][ T5636] audit: backlog limit exceeded [ 92.810687][ T40] audit: type=1400 audit(1772389057.879:104655): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.812670][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 92.819056][ T40] audit: type=1400 audit(1772389057.879:104656): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.783628][ T40] kauditd_printk_skb: 48707 callbacks suppressed [ 97.783641][ T40] audit: type=1400 audit(1772389062.889:152384): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.790145][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.792357][ T40] audit: type=1400 audit(1772389062.889:152385): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.794652][ T5636] audit: audit_lost=620 audit_rate_limit=0 audit_backlog_limit=64 [ 97.801580][ T40] audit: type=1400 audit(1772389062.889:152386): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.804993][ T5636] audit: backlog limit exceeded [ 97.811757][ T40] audit: type=1400 audit(1772389062.889:152387): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.814505][ T5636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 97.820679][ T40] audit: type=1400 audit(1772389062.889:152388): avc: denied { read } for pid=5636 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 97.822786][ T5636] audit: audit_lost=621 audit_rate_limit=0 audit_backlog_limit=64